Category Archives: Crime

EMF Meters for TI Use


Radio Frequencies and Electromatic Fields can be weaponized for use against ANYONE. With the advent of 5G and the Internet of (smart) Things, almost EVERYONE should worry about RF/EMF effects. THIS MEANS YOU!

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, Oct 30, 2020, from an undisclosed location not too far from wrong. copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

Hard rocks and harder places…

This is an extremely broad topic which cannot be well discussed here, beyond some basic advice. The problem for TIs is uniquely different from common uses of Technical Security Countermeasures (TSCM) equipment and services. So one problem right off the bat is obtaining useful help (good luck with that). This leads to a do-it-yourself (DIY) alternative by use of low-cost EMF meters, and possibly shielding or other tactical solutions. As result, most pros are ex mil-intel types, which creates a trust barrier with most of the TI community. 

Not that it matters: a TI simply cannot afford the cost of their services. Professional TSCM equipment is extremely expensive (a pro might have a million dollars invested) and extremely complex, and requires a lot of experience and the kind of training offered in the military and intelligence communities. So, between trust and cost, and unique needs, a TIs find themselves between a proverbial rock, and hard place, a DIY nightmare. That’s not all. 

That help issue trickles down the food chain to the makers and sellers of lower cost solutions, such as EMF meters, which are little brothers to more sophisticated and costly signal analyzers used by pros. Such firms do not and will not support DIY use of their products for TI related needs, and indeed, many pros will not offer their services, either because they fear running afoul with some government operation — or they don’t believe in the whole targeting notion and presume the client mentally ill. 

It is possible to hire a PI or some individual who’s gone into business using low cost gear to do ‘mini’ TSCM sweeps, some of whom are aware of and will cater to TI needs, but many of these are charlatans, especially true in those who specialize in select TI issues, such as ‘finding implants.’ Be wary of anyone charging for implant detection using small EMF meters, esp. if charging by the implant found: with many meters, it is possible to cause a false read by simply moving a finger of the hand holding the device toward the front of the meter… for another $50 ‘find.’ “Would you like me to continue searching?” 

It would therefore be better for the TI to do their own searches, though even with a decent EMF meter, the odds of finding an implant are extremely nil. EMF meters detect Radio Frequency (RF) and Electro-Magnetic Fields (EMF), which are radiated energy/field readings not given off by implants, as a rule. Most implants receive such signals, and those that transmit them tend to do so by remote command. Even then, it is very briefly, rather than being ‘on’ all the time — defying meter detection. 

While there may be exceptions, the type of signal they use is likely to be lost amid the ambient signals present already (i.e., wifi, broadcast radio/TV, cellular, AC wiring, power

lines, amplifiers, etc.). An EMF meter displays the sum total of all such data, and can only identify a source by virtue of increasing in signal strength as it nears the signal source. An implant signal is rather weak. But, implants aside, there are other valuable uses for such a meter, if you have a decent one.

Choosing an EMF meter

First, know that cell phone apps that offer EMF readings are not reading the right kind of EMF. They are not reading any signal which is involved with targeting, but instead, the Earth’s own magnetic field, using sensors in the phone designed for game play to know changes in the phones relative position to prior positions (i.e., steering a car in a driving/racing game). For like cause, avoid ‘Natural’ EMF meters or EMF meters that do not include RF measurement, as they are also reading the Earth, only. 

So what you really want is an actual RF/EMF meter. And not just any such meter, but one which is directional in nature when reading RF, and not omnidirectional. AC Magnetic Field readings will be omnidirectional, in virtually any meter, but if the RF sensing is directional, that will not impede usefulness of omnidirectional EMF readings. RF, on the other hand, is barely useful if only omnidirectional. That said, some omnidirectional meters will allow you to install and optional directional antenna… for added cost. One way or another, you want directional.

There are all manner of EMF and RF/EMF Meter designs. Choose wisely.

The type of antenna system described by the maker in specifications or manuals won’t necessarily tell you if it is omnidirectional or directional, they prefer a technical description of the physical antenna design (engineer speak). Omnidirectional (least useful for a TI) are typically described as ISOTROPIC or TRIAXIAL (3AXIS), and are often visually discernible by a large ball or spherical object at their top. Sometimes it is internal and, therefore, smaller and unseen. That limits the sensitivity, compared to an external. Directional RF meters might have no antenna, a rod antenna (like old brick cell phones), a ‘wand’ at the end of a cable, or a triangular antenna (very useful with distant sources). So, any other technical description other than Isotropic or Triaxial, is good. 

My base-line low-cost meter of choice is the TriField TF-2, which I actually used to sell with some value-added features for TI use. That included a user manuals I wrote for such use for the Trifield, and the Micro Alert audible meter (a good companion product). These manuals, along with a copy of this post and many others, are part of my TI Helps Kit available on request to proparanoidgroup at gmail com. I used to charge $10 for the manuals, but the Kit is free, though I do encourage a donation to the Free Will Society to aid severely impacted stalking victims (freewillsociety.wordpress.com) via PayPal to the above email addy. 

I compare all other meters to the TriField before considering them desirable, or worth the price for TI needs. It is a directional RF with omnidirectional EMF readings in a simple to use and reliable product at a low cost. You can buy direct (trifleld.com) or find it online from many resellers. Experts in the meter reseller and RF/EMF consulting field also use it as a standard for comparisons, and that is telling. In fact, currently, one such pro who advocates for the TriField is EMF Academy, a valuable resource for information to anyone interested in issues revolving around the topic. 

More importantly, they have a newsletter you can subscribe to, and associated with that, is a monthly drawing for one of three TriField meters. If you just visit their site and poke around looking at articles on things like EMF paint and shielded clothing, a popup will offer you the ability to subscribe and enter to win one of the meters. Some of their more expensive and exotic solutions I am currently testing, and will likely write an update report within a month: be sure to FOLLOW my blog so you get a notice. While you do that, also click the LIKE button and leave a comment, if you wish — all at that bottom of each blog post.

There are other features to look for in a meter which could be handy to a TI. An audible tone option, for working in the dark or allowing you to focus on what you are scanning (TF-2). Peak reading indicator and Avg signal strength (TF-2) instead of just a needle or light bar reading that is bouncing around enough to make such things difficult. It would be nice to have the ability to add a special antenna, such as (specifically) a dipole. This may be a round tube, or a flat, triangular antenna for very precise targeted distance source location (useful for DEW sources, typically hundreds to thousands of feet, or even miles away). Some offer a pistol grip or a protective case. These things are nice to have, but not usually critical, if you are willing to walk a bit more to effect the same results.

But the important feature is antenna, and frequency range. Most meters are intended only for cellular and wi-fi operating ranges, which stop (well before 5G) at below 3.5 GHz. One insidious risk of 5G compared to 4G and the current wifi standards, is that it operates at such a high frequency, citizens won’t be able to afford meters designed to check for safety. They may operate at up to 6 GHz. As it happens, DEW weapons are likely operating in similar ‘beyond hope’ ranges. My $12K meter setup can still only see to 12GHz, and some DEW will be above 50 or 60 GHz.  

And, it is true that EEG entrainment (mood, sleep control, thought interference), which many TIs call remote neural monitoring (a misnomer), operates at frequencies well below any low-cost meter on the market, unless you are looking at something like my $12K rig… which is exactly why I have it. We are talking human brain operating frequencies, at and below 30Hz. Your ears cannot hear below 30Hz, because if they could, it would confuse your brain, and therefore, that’s also why audio equipment tends to stop at that low end, as well.

Proper use…

Hold the meter level, flat in your hand, so you are looking down to see the reading. If you aim it upward, you are going to flood the meter with radio waves reflecting off the ionosphere, and will always get incorrectly high readings. You wouldn’t even be able to sense a satellite signal, that way; such meters are not designed for anything but environment readings or very near or high-outpt sources. Also, many meters without external antenna will give similar false readings if your hand is touching the ‘head’ or ‘business end’ of the meter, so hold it by the rear half, only. When taking a reading, your purpose may vary, but generally, you are looking for a ‘hot’ or higher-than-average reading among the ambient collective. 

Before actually taking readings, consider perp strategies. They likely have excellent surveillance and will know when you are using a meter. It is very likely that they would therefore simply shut down, making any sweeps pointless. This is why a pro TSCM sweep is typically conducted unannounced, anonymously, and with a degree of stealth and cunning. Ideally, it would be best if you arranged for a companion to do the sweeps with as little fanfare or obvious effort, as possible. 

This brings in additional problematic factors, such as trust and willingness to help in what is a lengthy and complex set of tedious steps. Or, you might get lucky and find the enemy’s gear is simply left running while they take a nap. For most TI’s, though, it can mean many attempts before being able to acquire useful information from the meter. Failure to find clues of targeting does not mean they never target, does not mean the meter is defective, does not mean you are doing something wrong… it just means that was not likely the right opportunity. 

And yet, of course, the other possibilities may yet be true, in the end. While a negative is not necessarily proof of a negative, a positive is its own proof. Even so… you will want multiple positives over time if to have useful evidence. That will also require good documentation, such as video and verbal announcements of what you are doing and seeing, and where the meter is pointing. Have a witness, too. More to follow.

Taking readings…

Slowly sweep back and forth, left to right, looking for possible reading jumps or dangerously high readings (hot spots). When you first start, you won’t likely know what is dangerous, or not. There are good online resources to help with that, but they can sometimes seem way too technical, and measurement increments of your meter may not match the measurement increments of a given site. That can result in confusion or misinterpretation, and force some math you might wish to avoid. Here are several sites you can review and compare against your meter, hopefully finding one more directly useful, without involving conversion factors. There are many others out there, and what constitutes unsafe levels is kind of a moving target in constant redefinition, and there is a difference in European, American, and Asian standards, the U.S. being the most lax (natch) of the three.

https://www.home-biology.com/electromagnetic-field-radiation-meters/safe-exposure-limits

https://www.trifield.com/faq/

https://healthybuildingscience.com/2013/02/18/emf-and-emr-conversion-formulas/

If you find a hot spot, stop and watch for several seconds to see if it holds relatively steady or was just a random spike. Generally, you will want to repeat scans in each of the meter’s modes of operation (i.e., the TriField has three: AC Magnetic, AC Electric, and RF/Microwave). If you are logging results for legal or comparative purposes, give it at least five seconds and note the reading(s), avg, and peak. If you’ve made an entry, be sure to note the values for each meter setting at that same position/angle. That added information could prove useful at some point. 

Hot spots may show up either as a gradual rise and fall as you sweep, or a sudden spike. It may be brief, or hold steady. Brief spikes are not typically useful, but one which holds or is above safe limits is very useful. Note if gradual or sudden, and especially note if it was synchronous with any impact on you or your environment. You will also want to get a compass heading (there are cell phone apps for that, relying on natural EMF, as it happens). 

If outside, and you are in something like a depression or valley, or a where there are tall buildings, you may wish to then tip the meter a bit to scan lower and higher in angle, such that you avoid looking directly into the sky (stay below the visual horizon, where rooftops may so redefine it), looking for further increases which may help identify a specific source location of the signal (a cell phone ‘bubble level’ app with off-level degree readouts might help with your notes, as well). If it is a building you are aiming at, try to estimate the floor, and note that. You may want a strong pair of binoculars, a rifle scope, or other strong lens to try to see what is at the suspect location. And it is suspect, only. A hot spot, even if very hot, is not alone a proof of a targeting source… but only reveals a possible suspect location.

If we are talking about finding a surveillance or other targeting device planted somewhere within your location with the meter, there is a similar concern, should you find something. Depending on the device purpose (which you may not be able to discern), and tactical matters dictated by your targeting situation (which may not be obvious), it may be to your advantage to leave it in place. You may wish to contact me (I am interested) via public library computer. 

Or, use your best judgment, if worried it might should be removed immediately. Video document its removal and take it directly to a bank and get a safety deposit box to put it in… or take it to a local professional for analysis, per the advice in the next paragraph. Send me still images, in place, and after removal, if removed. Safety first, if it involves AC electrical power, and if it is in a large sealed box, don’t try to open it… such are often booby-trapped to destroy the evidence; very scary fireworks which may require the Fire Department, as it once did in a case I was investigating.

Now, about suspects, we need a warning: If you do establish a suspect, DO NOT confront individuals which you might be able to identify. Instead, try to learn as much about them or the property as possible, and add it to your notes. You should then contact me, or an appropriate professional, such as a private investigator, lawyer, or Agency. I don’t recommend Police, but if you have good readings and symptoms verified by a Doctor as not due a health issue, you might want to contact the FCC or your State’s Environmental Protection Agency, or perhaps your local County Extension Office Agent. Some larger cities may have bio-home or bio-environmental engineers or similar, who could be very good resources, if available. If there is any significant find or action taking, I would like to hear from you, and may be able to suggest ‘next step(s)’ to consider.

Specific uses

To find a surveillance or targeting device in a structure (the TI’s ‘space’) requires comparing readings well away from a suspect source to readings within an inch of it, looking for a large increase (signal strength falls off at the square of the distance). Scan low, scan high, and all around. You will want to be as physically close to surfaces as you can get, without touching, preferably (no harm, no foul, if you do). Every object and surface should be treated as a potential suspect to be tested.

 One should establish ‘normal’ levels in a non TI environment (a test control space) similar to the TI’s space, and compare by taking readings at room center or well away from major RF sources (i.e., wifi, computers, tvs, radios, ovens, etc.). It should be a similar sized and designed space in the same neighborhood, between three and six homes away (arranging this can be daunting, if you do not know anyone who fits the bill, who would be willing to participate — try requests based on your own concerns in the neighborhood about high 5G signals, until you find someone who worries about 5G). 

This is done in several sets of readings, each — one with those RF sources operating, and one with them turned off, and one with the Mains turned off (no AC power to the space). If subject to significant electronic attacks which can be physically felt or sensed, the TI’s space reading should additionally be undertaken as sets during both times of no sensed attack, and during an attack (which may prove difficult, if under surveillance — the perps may elect to cease the attack once you set up for the readings… which might buy you some peace.) You should also take readings at the power company meter at both spaces at a time of day when major appliances are not in use, and note how fast the meter is changing, and in the TI space, take an additional reading when the mains are turned off. 

Finally, you will want to walk around the space on the outside taking reading pointing away from the center of the space, looking for hot spots. Directional is King, here.

To test for bio implants in a person or a tracking device on a vehicle, the best place will be in the country, away from any nearby potential sources for such signals… such that ambient broadcasts and distant cell towers are about all that’s being read. All cell phones and the like should be turned off. Don’t try to find an implant on yourself, have someone else take the readings. Every inch of the body should be scanned, and I suggest wearing a simple nightgown, PJs, or a bathing suit. Feet wide apart, arms held out to the sides. Be willing to get fairly personal. One then verifies by going on past the body in the same direction to insure the reading is dropping, again.

If a vehicle, pop the hood and trunk and doors to scan the interior areas, it being OK to lean into and ‘look about’ with the meter, just trying not to aim directly at the sky. Don’t forget under the seats, fender wells over the tires. It would be nice if you could put the vehicle on jack stands so you could safely get underneath it (where aiming upwards at the undercarriage will be fine). Jacking each corner up as if changing a tire is much more work… but avoid actually going under the car with any more than your arm. You will want three sets of tests, one with the engine running (in Park or Neutral, Emergency Brake set), one with battery connected and the key in the accessory setting, and one with the battery disconnected. That will tell you if any suspect readings are from something drawing power off of the car, or if it is battery operated (which means something bigger, and easier to find in a visual search). So, be sure you have the needed tools.

What do results tell you? 

  1. Where readings are higher during an attack, DEW is all but confirmed, and additional steps (T1, at document end) will be needed. Where they are not, and the attack was sensed, the sensed effects are more likely to be a health issue (all TI symptoms are carefully designed to mimic health issues), and you should seek medical advice, describing only the symptoms, not TI concerns. Get a second opinion using a random Doctor. If no high readings and no sensed attack, try again… and again;
  2. where readings are higher in the TI space with all power off, than in the control space in like status, it indicates battery operated surveillance is likely, take steps (T2). If the same, it implies that any perp equipment present is drawing power from the house by any number of means, use step (T3). NOTE: it is certainly possible for both to be true;
  3. where readings are higher when RF/EMF equipment is turned on in the TI space compared to the control space, it implies that the equipment operating is either defective, or perhaps weaponized against you in some manner, take steps (T4); If the same, it implies them safe;
  4. where readings are higher when the equipment is turned off than in the control space, and the first part of item (2, above) is false, it implies the AC power system has been weaponized, take step (T5);
  5. where power meter readings are higher in the TI space than the control space, it implies the Meter is relaying a lot of data from perp devices… just good to know, as the other tests will address needed steps. If not different, it implies the meter is not a Smart Meter, or the meter has not been weaponized to relay data. Relay of perp data does not imply the power company is the recipient or participant, though it is always possible;
  6. where power meter continues to draw power with the mains turned off in the TI space, it means there is the possibility the perps are drawing power off for their devices directly from within the mains junction box (circuit breaker box), and may include electrification of the ground to create high EMF readings in the home, and likely, the embedding of targeting signals within the AC wiring. Take step (T5).

T1 (DEW test). You have had positive space readings within the structure and they point to DEW presence. You now need to do external readings at both spaces by walking around the building site and taking reading pointing directly away from the center of the building or room of concern (don’t sweep left to right — you walking in a hypothetical arc about the center point, instead). 

Compare these to the interior readings at the same compass heading. If there is no agreement, the source is likely inside the structure: do a 180 and sweep to confirm, directly along the outer wall surfacwes. If they do agree, compare the average signal strength. If it is a notably higher, then the source is relatively close, and in theory, if there was nothing in the way, and the source was left operating, you could walk toward it until you found it… such as a neighbor’s home. If it is not exactly higher, then it is much further away, and you may want a bicycle or car to chase it down. 

T2 (Batteries). Battery operated devices are bigger, and easier to find because they will require a nook or cranny. Do a visual search for anything that is unusual or foreign. Do not remove it. Video the discovery with audio description. It may require some disassembly of door panels, carpeting, dash components, etc., which may mean professional help or tools, in which case, you must be present and video. Contact me with the circumstance and send me still images of the object, that I may suggest the next steps. Do this covertly, such as by use of a public library computer. 

T3 (No Battery). That means it is either hidden within an appliance (i.e., TV, stereo, blender) that is always plugged in, or it is wired somehow directly off of an AC power line, perhaps in wall or atic, under floorboards or behind baseboards. If the meter is pointing towards any such appliances. Unplug those items and move them aside, and take readings, again. If the readings fail to match, plug them back in elsewhere, and read again at the new position. If they again match, they need to be dismantled, looking for anything that seems added. You may want to take it to a repair shop, if unhappy at the thought of DIY (some items have voltage capacitors which can cause severe electrical shock even if the item is unplugged). You have to worry about such items on the far side of the wall, as well, by the way. 

If the appliances don’t change the readings when removed, or there were no appliances, then we worry about wiring in the walls, floorboard, and ceiling areas. Aim the meter at angles to see if there is any confirming change in readings. If low angles are hotter, you may need to pull the baseboards, wall power outlets, or get under the floor (i.e., basement ceiling area). If high, there may be ceiling molding to be removed, or you may need to worry about something upstairs or in the attic ((where you will be wanting to follow all the house wires, looking for a cut and splice with something dangling (perhaps another long wire to chase down) off of it)). Otherwise, we check light switch wall plates, picture frames, wall hangings, or window sashes, etc., as may be in the line of sight of the reading. Again, be mindful that walls have two sides. Watch out for fiberglass or asbestos insulation… you don’t want to be messing with that without serious protective clothing.

T5 (AC Power Compromised). Consider to contact a Home Bioengineer or a large Electrical Contractor who is capable of doing large-scale power system work (i.e., can contract to build sub stations and the like — which means they know more and have better tools than ‘an electrician’). Go directly to the Power Company if there is no such services in your area. The idea is to complain about dirty power and possibly high ground voltage (say nothing about targeting) and ask for a power quality survey. If they find anything wrong, they should be able to fix it or arrange for the power company to fix it. Simply going to the power company first may not be a great idea, if they have been compromised and are complicit.

Shielding Solutions

See the document on Shielding which is also included with the Helps Kit, or request a copy.

How To Identify FAKE Targeted Individuals


There are many kinds of Targeted Individuals. But there are also many kinds of fake TIs, and they can prove to be as dangerous as perps, even when not perps. Some real TIs even end up de facto fakes, as well. 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

 

Dealing with fakes

This is being written directly to TIs. The word ‘you’ is intended to mean the TI reader.

I’ve been helping TIs better their position for more than two decades. It has enabled some to break entirely free, and improved the circumstance of the great bulk of the remainder. Rarely do I strike out entirely, and almost everyone has thanked me for their gains. But there is something wrong in the TI community. In terms of effect, it parallels a virus… an infection.

iu-5I diagnose it as an infection of Fake TIs. Just as there are many kinds of targeting and thus many kinds of genuine TIs, there are many kinds of fakes. Identifying them has always been rather difficult, it taking years to even realize there was such variety in type. In the past, it might take significant interaction with a TI to discover if they were sincere, or pretenders, much less divine them as a type.

Only recently have I realized the truth and the solution is far simpler than thought. I’ve had contact with over 12,000 TIs over two decades, and the answer was there, all along… just hard to see… despite the size of the problem. But recent events have proven key to understanding.

 

Types of fakes, reasons

The enemy! The most obvious, it is also the only type most TIs tend to worry about, which is a mistake. The most insidious fake of all is the deliberate Wolf in Sheep’s clothing, actual perps infiltrating the TI community to accomplish a variety of missions in support of targeting efforts. That may mean they work for a specific program or developer of technology, or it may mean they are there for a specific TI or group of TIs targeted by a specific team or for specific cause, such as ongoing research for statistical analysis. In the latter case, they will be careful to avoid seeming so, and will ‘free range’ their cross hairs as to whom they choose interaction, lest the intended victim sense their purpose. Seldom will they overtly do anything to give themselves away, and in all cases, they are quite likely to maintain multiple online identities such that if one is identified even by mere suspicion, others remain free to continue.

iu-9

They might be Trolls there to gather intelligence and/or evaluate the progress of the greater programs which lay behind all targeting; quality control analysis, ‘customer feedback.’ It is amazing how vocal a TI will be in public forums, revealing things they should not about their targeting, or what they believe or think about technologies used or perps involved. They act like THX-1138, confessing directly to the intelligence community disguised as religion.

These things are a confirmation that targeting is working as intended, that disinformation is working, and makes it easier for perps to fine tune their program, and grow their psychological profile. How many times have you (if a TI) been hit with requests to share your targeting information in a public forum, or for a public use, such as ‘a law suite’ or ‘appeal to a government or NGO’ to (allegedly) seek their help? How many times are you asked or volunteered because someone else already had done so, to detail the effectiveness or intensity of your targeting? I assure you, that is valuable information to perps.

DON’T be that victim!

Some exist only to sow discord, start arguments, divide and conquer, almost always present wherever TIs congregate, including things requiring Membership. Heaven forbid the TI community or group should actually be able to organize and accomplish good against the evil. When the Free Will Society formed, by the time it had 25 members, it was eventually determined that three of them were, for certain, quietly working in the background to destroy any gain towards our project to establish the ONLY proven long term solution to targeting, our Free Will Haven project. Each was spreading various lies about our effort. Learn more about the project at www.freewillsociety.wordpress.com

Others are a supply conduit of deliberate disinformation designed to distract TIs from truth and keep them in doubt as the true nature of their circumstances; you cannot fight a problem if you don’t have a handle on what that problem is, and how it really works… especially if you are fighting an imagined nature of it shaped for you by the enemy. And yet others are there simply to make a buck, offering some simple ‘cure’ or ‘aid’ for which there is typically scant evidence it really works, and even less that they are at all who they claim to be. They know TIs are desperate enough to risk a few bucks, ‘just in case.’

Innocent fakes. There are numerous psychological issues which drive people who are not exactly paranoiac or schizophrenic, but who are driven non-the-less to pretend to be victims. Call it the sympathy seeker, if you like, because it is attention and sympathy, or feeling special and unique, which they seek. Many soon enough become so entrenched in the role-play that they start to believe that is really who they are… like an actor who starts to believe their own PR, and tries to live up to it until it seems second nature.

Like a hypochondriac, they will tend to adopt whatever new symptom or popular new technology or method of targeting currently seems to them to be in vogue within group discussions… even if it is false disinformation. This, is the harm they represent; they thereby perpetuate falsehoods, though unknowingly, in their ignorance. Disinformation, if to be effective, relies on their doing so. Not much can be done about them, short of exposing them… hard to do, because when it comes to targeting realities, certainty is in short supply. If it were not so, it would be easier to combat.

Mentally ill fakes. Paranoiacs and Schizophrenics. Victims of their own mind are just as dangerous to the TI community, in terms of reliance upon anything they say to be true. They also foment a general disbelief by the public at large in the concepts of targeting, and especially authorities and others a TI should be able to approach for helps. Their mental illness is projected wholesale upon all TIs, and is so effective in result that even significant others, family, and friends, will prefer to believe a TI is mental, than to accept the truth of targeting. It is literally the case of one rotten apple spoiling the bunch, in that respect, and is why TIs are so sensitive to the topic of mental illness.

Yes, there are other factors which make such third-party disbelief the easier choice, but the fact remains: actual Paranoiac and Schizophrenic sufferers do exist among the TI population, and the worst of them give it a black eye. These are the ones trotted out when Congress tries to ‘investigate’ mind control, and they drown the truth of actual testimony in their delusional depictions. Again, exposing them can be difficult, but it is advised that one should not be timid in challenging extremely difficult to believe stories. If enough were to do so, they would go elsewhere.

That said… interestingly, and tragically, in my work with TIs, I’ve found there are actually many cases where someone with a mental issue is also targeted. This is a desirable victim trait when looking for a target dummy for trainees being taught how to employ Political Control Technology and methodology. It makes sense; if a trainee screws up badly and does something which leaves useful evidence, authorities will tend to be disinterested because the person reporting it is known to be mentally ill. They won’t bother to investigate beyond polite lip service.

The target ends up being passed from one set of trainees to another, for life, increasing the likelihood that targeting will in time lead to serious medical harms, or death — because trainees will can easily make serious mistakes when playing with DEW weapons. In some cases, it is intentional ‘joy riding,’ given that many perps are psychopathic sociopaths. Some are themselves victims (programmables), and know not what they do, the effect on the target often the same dangerous end, regardless.

De facto Fakes. This is the category which ultimately led me to discovery of how to identify a fake more easily. They are truly not fakes, but simply act in ways which effect the same traits. It happens two ways, easiest to see in the category of MK Ultra and Monarch style victims; people who have undergone complete captive programming programs akin to Manchurian Candidate, or Jason Bourne techniques (not as fictional as some would wish us to think). The first way has nothing to do with the TI community, and impacts them, alone… and is present in the time frame where they have no understanding whatsoever that they are a victim. They have yet to awaken. They are a complete and successful fake unto themselves, alone; a very sad thing.

And they perhaps never will awaken. Only when something ‘goes wrong’ in the programming or control of the victim can they become aware. When they do, the second means is then in effect; such failure always results in traditional targeting intended to render them ‘mentally ill’ by any third parties they may come in contact with, especially authorities and helpers. That is, of course, the usual targeting modus operandi for all TIs, but it is critical for the MK, because they have trapped in their mind, and at some risk of erupting forth, secrets which can prove… everything. And yet, as an asset, they are far to valuable to simply liquidate, as a rule… unless the knowledge does erupt, in which case they become subject to a Bourne-style solution.

 

The hidden commonality that makes all fakes easier to spot

This brings us to a stark conclusion, one which has literally risks negating twenty years of my life’s work in trying to help TIs. The one common trait of de facto MK/M fakes is this: they will not help themselves, or they will self-sabotage any efforts at it. That may take a bit of explanation.

‘Will not help themselves’ can mean that they will simply not take advice that is known to be effective. For example, I might offer a simple test which would allow them to identify the type of technology employed against them, and where it is operating from, perhaps even identifying the players involved, thereby. They simply do not undertake the tests, coming up with some lame excuse as to why, even if it requires a lie, to do so. Or, they will claim to have taken the tests, and gotten negative results, and probably so — self sabotaged.

iur-1.jpeg‘Self sabotage’ can be subtle or obtuse, depending on the type of fake TI involved. Obtuse sabotage is when the fake deliberately and knowingly sabotages the effort. It is rather rare, because only the Enemy fake has a reason to do so, and they would only need do so if others were present to observe; they would otherwise simply lie about their efforts. But the MK/M will always sabotage, either knowingly but without understanding why, typically then rationalizing it internally, or unknowingly even to themselves, when executing a programmed function in an alternate personality called forward for the purpose. Fortunately, the number of MK/Ms is relatively low, but sadly, such victims are the hardest of all to help for this reason.

Subtle sabotage is something all kinds of TIs themselves can be unaware of doing. They simply will fail to follow the instructions correctly, or be clumsy when performing the defensive advice such that the enemy will perceive it, and take steps to avoid the effort’s intended goals. That is especially common in the De facto fakes, and those based on mental issues, serious or otherwise. But any TI can sabotage their own efforts this way, as we shall shortly see.

That means that ANY TI can ‘be fake,’ unto themselves and to their cause, and not even know it.

For twenty years, I have wondered why so many TIs seemed so prone to self sabotage, the most common evidence of it being the constant excuses as to why they would not even try a given advice. Usually, it would be claimed it had already been tried, by them, or by someone else. Even when I point out that it must be done correctly (and I give very explicit instruction) and why it can fail if not done just that way, they will continue to resist the advice. Excuses, excuses, excuses.

 

Come forward in time

FHHlogoThe one thing which has proven to completely resolve targeting is the concept which lays behind the Free Will Society and its project, Free Will Haven. This has been widely promoted among the TI community, but to what end? The concept has been tried in a couple of ways (‘beta testing’), and provided proof that it works extremely well:

three TIs have enjoyed a total of some 3,000 continuous targeting free days.

And yet, the primary beta site failed through self sabotage. The principal character involved was a female TI of long suffering. Because she was investing her own money into the project, she was given complete autonomy and control of the effort. Despite specific advice on property selection and how to qualify TIs as co residents, as we had initially agreed, she elected to do things her own way, after all. She even refused my participation in ways which led to a break in communications, about half way through the effort.

In the end, as result, she ended up trying at least four different locations before achieving any level of success. And, unfortunately, by rejecting advice and possible other forms of self sabotage, she made blunders which lead to being evicted from the location. One such blunder was not asking for additional financial help from the Society, because she had forced the break in communications, not just with me, but with the Society members who had earlier provided financial support. Pride and stubbornness is presumed; a form of self sabotage. To this day, she has not responded to outreach. Worse, she continues to work to try yet again, essentially working against the Society’s efforts.

The other important fact that is news which relates to self sabotage, is that the Society was at one point on the threshold of obtaining significant funding towards realization of this dream solution in a way that can help dozens to hundreds of TIs obtain total escape from their targeting. It also would serve as a gateway to even more important goals, such as actually exposing and proving targeting is real, pervasive, and government sponsored, leading to actual successful lawsuits, media and government investigations, and termination of programs with perps and others behind them being jailed.

The stakes could not possibly be any higher for the TI community.

With the help of ATN World News, and a pooling of contacts outside of the TI community, we were well poised for significant investment into the Free Will Haven project through the Society. Millions of dollars worth, in fact: enough to buy land, homes and central services, vehicles, and even to fund relocation of participating TIs, and provide monthly income to some of them. It might even have funded mobile strike teams of TSCM and PI professionals who can covertly investigate, document, and prove targeting cases valid in courts of law and before media.

How much more help than that, can we ask?

 

And yet, the fake TI rears its ugly head, threatening it all

Before anyone will risk investing millions of dollars into the Free Will Society (and we are finally very well poised to create just that scenario), they will need to see that the TI community is sincere and valid, that it has a serious stakeholder position in seeking a cure. Who would give a bum a hand out of $1,000 without some sign they would use the money to escape being a bum? The only way TIs as stakeholders can be judged worthy is if the TI community unites to some useful degree behind the project, expressed both in terms of membership in the Society, and some level of self-booting financial commitment.

iu-10.jpegThere would seem to be some 300,000 aggregate count ‘members’ in Facebook Groups which relate to targeting issues. There are so many groups that I would not wish to attempt counting them. Frankly, there are too many such groups, and some of them appear to be run by fake TIs of the worst kinds. Be that as it may, ‘members’ in single quotes is used because the typical member of one group tends to also be member of 3-5 other groups, or more. So while that negates the 300,000 figure, it still means that there are many tens of thousands of TIs in the Facebook community. I’m thinking around 70,000 specific individuals.

I and the Free Will Society has repeatedly reached out to virtually every one of these groups. And yet, the Fake TIs have made themselves known by their response, which is that form of subtle self sabotage and refusal to help themselves… the hidden commonality. The Society should have by now many hundreds of Members, perhaps into the thousands. It should have, by now, accumulated at least several to tens of thousands of dollars in contributions toward its proven viable goals. Failed organizations such as FFCHS have previously exceeded these kinds of member and donation numbers several times over, and for fraudulent and/or foolish causes in some cases.

Yet at best, we have had some 40 Members, almost all of whom balked at modest $25 annual dues. At best, we have raised a total of less than $2K in contributions and membership fees. The bulk of that has been because I and one other author have donated 100% of the sales of our ebooks (not the profit, the actual sale price) to the Society. I remind you that I have essentially been homeless for the last three and going on four years, though I now at least have a place to affordably park my Mobile Home — and yet I still made those donations.

What have YOU done? Click ‘like?’ Or is your devotion to your cause so strong that you dared to click ‘share?’ SHAME!

I must conclude that if those are the limits of your action, you are not a genuine TI, but a fake. If you won’t lift a finger to help yourself by helping to establish a stakeholder position suitable to a large investor’s need, then we never will attain the funding needed to realize the effort. Your apathy and lack of participation betrays your own cause as fake. No one else. Not the perps. YOU!

You belie your claims of targeting and your disdain for it, rendering it a moot footnote in terms of importance and validity. If you will not take action to support something proven to work, you have both sabotaged your own best interests, and deliberately refused to help yourself, and you fail to actually be part of the community, supporting the community.

Example: I recently posted on my main FB feed a simple post underscoring much of what this article describes in simpler terms. It was a call to action which specifically chastised simply clicking ‘like’ or ‘share,’ instead of actually doing something. Out of some 3,000 FB friends, there are several hundred who are TIs. What do you suppose the response was?

[[ One like, and one share. ]]

What other reason can there be for that kind of inaction? YOUR inaction? Prove me wrong in my conclusions, or take action, now, TODAY. Here are six simple things a real TI with a serious intent on winning the war would proactively do, given the above facts:

  • Join the Free Will Society (.wordpress.com);
  • Use the promotional tools provided by the Society to spread the word;
  • Donate to the cause (gofundme);
  • Yes, LIKE and SHARE things which promote the Society and the project;
  • Directly reach out to fellow TIs as individuals and engage in two-way dialog to convince them to do the same six things (evangelize our cause). You will then know who is fake, or not, yourself, experiencing them first hand, as do I;
  • Stop doing those things which aid in your targeting.

Unless you do these things, then I must conclude that so many of you are fake, that there is no point whatsoever in attempting to help anyone. And boy, will that make my life a lot easier. And then, you can go back to complaining about how bad things are, and liking and sharing similar miseries posted by others.

I, the Free Will Society, and the future residents of Free Will Haven await your decision. I’ve attempted everything I can think of. Now it is up to you.

One final note: it would seem that the fakes have been using Facebook’s complaint feature to cause facebook to ban me from posting to the TI groups. Anyone who has ever read any of my TI group posts knows that there is nothing in them which approaches any definition of ‘offensiveness’. So, as I can no longer post to such groups, this to, is now up to you. The damage has been done, and now only you can undo it.

YOU are what you’ve been waiting for!

…and I’m no longer interested in trying to help those who won’t help themselves.

Your future, and the future of the Society is in your hands. 

 

 

Why TIs are Often Targeted by Police


Rare is it that a given Targeted Individual won’t have reason to believe Police are involved in their targeting. And yet, they were not… not officially. Here’s the why and how of it…

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   >>better at>>  MeWe 

copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

 

Color of Law; Police abuse of power in personal agenda

In the two decades of working with thousands of organized stalking victims and victims of other forms of targeting, the single-most common complaint is the suspicion or outright experiential evidence that multiple Police Officers are complicit in the affair. If not the Police, then some other law enforcement or intelligence agency… or both. Indeed, this has been my own experience in two of three different episodes of personal targeting over a 15 year period. In fact, multiple agencies can be involved simultaneously; Ive gone up against as many as five LEA, plus FBI and CIA assets, bounty hunters, and military intelligence in a single targeting. This has been documented in my various books showing how I beat them in the end… but it was no cake walk.

18ead0da1288531458e423daff24aef2--social-awareness-funny-shitThis is a problem for more than the obvious reasons. The most obvious is, that the very authority who should be responsible for investigating and protecting against such crimes, cannot be trusted by the TI to help anyone but the perps behind the affair. Calling Police for help is almost always like asking a burglar to help you secure your home. Secondly, when officials of any kind are complicit, the victim is then entered into the official record as being mentally ill, or in a worst-case scenario, guilty of some convenient crime. Even when not complicit, going to Police about targeting is likely to have the same result; they simply do not want to believe in the Boogeyman, and see anyone who does as a mental case. In fact, stalking is designed to get you to go to the Cops for just that reason; they want it on record that you are mentally unstable. DON’T DO IT.

But there is a DO list!  Do video and log all interaction with LEA or have a witness from whom you can get a written statement immediately after. It will help keep Police somewhat confined in their actions against you. The more you collect such material, the less likely are they to risk any useful action against you; you can illustrate a pattern of harassment. Do make copies and hide them well, off site. Tips in my first book, The Professional Paranoid on all of this.

The worst example of the problem from my client situations was a Navajo Indian, an ex Green Beret, who was targeted after his daughter was kidnapped by a Satanic Cult with all the earmarks of a CIA mind control operation. Within weeks of going to authorities to seek help, all manner of problems beset him. Traditional surveillance and stalking, and electronic targeting, to include V2S was the least of it. When he began using my advice and his military skills to determine the players and go after them aggressively, it took a turn for the worse: suddenly, his mortgage was six months in arrears and his house was being foreclosed, all his credit cards were maxed out and past due, his bank accounts emptied, and there were outstanding warrants on him for assault with a deadly weapon and skipping out on bail. He was, in fact, declared ‘armed and dangerous’ with an all points out on him. This was all done by back-door computer manipulation of data files by professionals of CIA caliber.

He took additional advice from me and then went underground to organize with other ex military buddies and Navjo friends, and went black in order to wage an unseen war against the enemy. As I never heard from him, again, I must presume he failed in the effort, or was successful to the point of having broken enough laws that he needed to remain underground. I had, in fact, advised him not to contact me for such cause. But, as I have said, these are merely the obvious problems with this particular aspect of targeting.

 

The other shoe that usually falls…

Perhaps the second-most common awareness about stalkers is that they seem to regularly consist of a lot of Masonic types. This is often determined when getting a good close look at them or their vehicles; the Masonic emblem, or some similar fraternal order emblem, is found in evidence. Usually, it is either a sticker on a car window, a pin on clothing, or a ring on a finger. I myself have seen this in my own targeting, the one incident where true gang stalking was involved (as opposed conventional targeting with general surveillance and dirty tricks).

After guesting for four hours on Coast to Coast with George Noory to talk, in part, about my new book, MC Realities, I ran into the Masons almost overnight. I had mentioned on air the involvement of the fraternal organizations in gang stalking, and how they had evolved from the Knights Templar and their exposure to the satanic Hashemites and Assassins of the Middle East during the Crusades. On air, of course, I gave my name as H. Michael Sweeney, my ‘pen name.’

Two days later, I was at work where I was managing a gas station while investigating the Oil Industry, infiltration style. It would result in two forms of targeting, the first of which was by the Masons, that second day. A man bought gas and elected to come into the office to pay, where I was at the time. He waited until I was the only one present, and then offered to pay, holding out his fist, palm down. It was only a couple of dollars in gas, so I assumed it was a handful of change. Wrong; it was a message to be delivered.

NOTE: the second was targeting of the Station itself by a terror cell, of which one of the participants recognized by me as a helper to two of FBI’s Top Ten Most Wanted and two other Islamics… and FBI agent who had been earlier involved in the my own targeting as earlier described. It was, in point of fact, to be yet another False Flag operation, later described by President Bush as Gas Station Tasking… which I thwarted. Arguably, the two targeting incidents might be seen as related, but even if so, it is unimportant, except for the fact that it illustrates that one almost never quite knows for sure why one is targeted, and who really lays behind it. This is described in my wordpress home page, if you wish to learn more.

Placing my hand beneath his, he opened it, and instead of coins, a money clip fell into my hand with a wad of Hundreds. “Take what you need, Mr. Sweeney,” he said. My name tag simply said “Harry.” He had a very wry, knowing look on his face, which slowly turned into a smirk as I manipulated the money clip to retrieve a single bill. In doing that, I discovered a gold and jeweled Masonic emblem on the other side of the custom-made silver clip. A broad grin overtook his face, to the point of becoming silly.

iu-1“Interesting how some thing have more than one meaning,” he said, as I returned the clip and fetched his change. That day, when going home, There were three of them outside of my Condo, and several cars with Masonic emblems in our parking area, none of which had ever been seen before. I ended that stalking by using the methods in MC Realities, methods that many Tis would be unable to employ unless doing so upon first targeting, as had been my situation. Once targeting has been ongoing for some time, the typical TI no longer has access to the needed resources for such a defense. The one remaining defense is found in an earlier post.

In MC Realities, I trace the evolution of Mind Control technology (Political Control Technology) from the time of Adam and Eve (the Serpent’s deception was the earliest form of controlling thought… the same version of it as we see today in media manipulation), forward. The Templars, after being ordered destroyed by the Pope for having discovered their Satanic practices acquired in the Middle East, went into hiding. In time, many of them hid within the Stone Masons Guild, and eventually, took it over to form the Freemasons as we know them, today.

Hedging their bets, should they be found out a second time, they formed splinter fraternal organizations, as well. Any group with any of these words in its title… Fraternal, Ancient, Order, Ordo, Lodge, Temple, Grand, Sacred, Rite, or Knights (and similar)… is very, very likely a fraternal organization with a Masonic organizational construct… and at the higher levels, at least, closely affiliated with the Freemasons if and when it becomes convenient to the parent group. Therefore, it is easy to involve small armies of ‘helpers’ if someone is deemed a target. It is important, however, to understand that the rank and file lodge Member who may be induced to participate, has zero true knowledge of you or the purpose of the targeting; they are simply ‘helping a friend’ to solve ‘a problem.’

I end this section with a simple note: all Masonic systems are quite steeped in ancient mysteries of the Middle East, and beyond, typically focusing on Egypt, Syria, and the Holy Land… with a touch of the Sub Continent (India, Nepal, etc.) and Far East.

 

The two shoe laces are tied together…

iu-2This is where it gets interesting. Most big city Police are encouraged to join the Fraternal Order of Police (FOP), and it is indeed Masonic in structure. FOP, for instance, employs the Masonic all-seeing eye of Egyptian fame in their logo, which is a five-pointed star with a circle bisecting the points to create five triangles shaped like the Compass of the Masonic emblem, also the shape of the ancient steeply-angled Egyptian Burial (pyramidal) obelisk used for commoners’ crypts. There was additional heraldry-like art akin to European styling in the center of the star, shapes quite like those of most Police Badges, and incorporating an Eagle and other symbols. In other words, Police departments not only adopted the Lodge system almost universally, but did so to the point that their badges reflected elements of the FOP emblem. Almost all Police badge shapes generally post dated the FOP affiliations, underscoring the link. The exception would be Sheriff stars, and yet, that shape is also of ancient Masonic importance, in both the upright and upside-down (satanic Baphomet) versions.

If that were not enough to convince you, let us take a look at the Police Department of New Orleans. New Orleans existed as a city at the time of the Louisiana Purchase from France, in 1803. The first Masonic Lodge (a French version), was established there in 1793, all its members speaking French, and some Spanish, but no English of note. All the better to remain secret and mysterious to Americans, when they came into possession. But to fully appreciate New Orleans in the equation, we have to first look to New York.

In 1915, the Fraternal Order of Police established their first Lodge, there. It spread from there to many other cities in very short order. The FOP was not intended just to be a Lodge system, however; it also took on aspects of Unionization, a kind of bargaining force with the City whenever Members felt that Cops were not getting a fair deal from the Mayor. In many cases, in fact, their bargaining strength was augmented by the power of the greater Masonic power structure, a formidable force at the time.

Over time, actual unionization was also achieved in almost every major city, usually through the Mob’s control of the AFL-CIO, making it easier to arrange for hijacking of intrastate trucking or of dock cargo without anyone ever being sent to prison. But that’s another story. Ask any retired Union trucker or stevedore from Jersey. I’ve heard the same from 1975 Oregon members. The importance of that will explain to some Tis, those who believe they were targeted because they reported illicit drug operations or crimes which might be related to Unions, are targeted by Police. Additionally, of course, CIA sanctioned drug operations are protected by Police, as well. Thieves in bed with thieves, the bed made by the thieves.

Though New Orleans under the French had a Police Department as early as 1796, it had no Police Department for rather a long period of time after it raised the American flag. It was instead ‘policed’ by a vigilante system until 1853, when they formed their first ‘American’ Police Department. Almost immediately, they adopted the ancient Cresent and Star (upside down, larger star) as is common to Islam, as their badge. It is still in use, today, and appears on their cars, as well. Well before the FOP had even existed, this Department was already incorporating Masonic symbology directly in its badge. This is better known as the Shriner’s symbol, today… the Shriners being a Masonic fraternal lodge system.

 

iur

So, clearly, the Masonic influence and ties are present within most Police Departments. Cops form some of the strongest bonds between individuals in service outside of the Military, sufficiently strong, in fact, that if one of them asks a color-of-law favor of another, it is not likely to be turned down, and certainly unlikely to be exposed even if turned down. Therefore, it really only takes one Cop being approached from a fellow Lodge member to recruit several more for any needed aid, even if that request came from a lodge in another city. Ergo, escape to another city tends to never result in escape from targeting.

NOTE: That is why the Free Will Society exists; a solution to virtually all forms of targeting. Please join and support (donate/promote) our effort to create a targeting free intentional community of our own, and our other advanced programs planned for the future. If you are reading this, you should immediately join the Society and give it full support. It is a far more valuable TI resource in terms of programs and goals than any of the so-called ‘TI groups’ out there, today, the bulk of which are nothing more than information and disinformation mills.

Please: you owe it to yourself to visit freewillsociety.wordpress.com to learn more.

 

Three shoes?

Yes, there is a third shoe, one of special interest to those who feel the intelligence community lays behind their targeting. Every major Police Department in America has in place assets loyal to the Central Intelligence Agency, and many Officers have military intelligence backgrounds. Usually, you can count on some of them holding key positions within a given city: the Chief, the Public Relations Officer or Spokesperson, the head of Internal Affairs, the head of the Swat Team, and/or the Head of Personnel. From these posts, especially through IA, they are able to find bad cops who can be blackmailed into playing ball on an on-call basis, for any kind of dirty deed, to include color-of-law abuses such as is common to targeting. Don’t forget CIA drug running operations.

If that were not enough, there are similar, but far looser ties with FBI, Homeland Security, and the US Military Intelligence Agencies (and in some case, others, including the United Nations, and even Mossad). These generally entail the network of Fusion Centers and Centers for Excellence*, and special programs such as Community Policing and the Strong Cities Initiative/Network. When you consider that most all of these agencies use computer software based on CIA’s PROMIS data base management system, which is nothing more than a data base engine with a back door built in… almost any form of hanky-panky is possible. Ergo, the Navajo Beret Syndrome.

* Search for ‘Centers for Excellence + Homeland’ to see why I include it, here. All these items work together to collect, evaluate, and share information on (persons of interest). They operate as one big networked spy tool with usefulness in organized stalking which can easily be misused by anyone within LEA who has access.

So, even if Masons are not involved at all, Police can still be brought to bear on any given TI with the same level of efficiency, and in fact, the FOP can be leveraged into the equation just as easily, in reverse manner. Will the average member of the FOP, the Masons, the Police, or any of that long list of Agencies be aware of any of this? Absolutely not… not unless they are higher on the food chain. Then, of course, they won’t be admitting it, either. Complaining about it gains nothing. Knowing about it, and understanding it, can mean a lot, however.

You may not be able to beat it, but when the mystery is gone, its just another damned nuisance to deal with, and another reason to avoid trying to rely upon Police for help, unless you know one you have great respect and trust in. I was lucky. I had a relative who was a Cop in an uninvolved LEA, and he was able to help off the record in very useful ways. I also had help from ex FBI friends with back channel access, of like value.

We can’t all be so lucky. And if you are a TI, you know luck is not your strong suit.

U.S.P.S. “Informed Delivery” Potential Threat to Everyone, Esp. Stalking Victims


Thanks to the Post Office, now anyone can know what’s in your mailbox, automatically… including of course, anyone in an alphabet agency. It is just another way to track you and criminalize you if deemed convenient, in time.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

“Informed Delivery?”

web_USPSThe idea is you register online with USPS for the FREE notification subscription service, and they then photograph the mail to be delivered to you each day, and email the images to you before delivery; that way, you know if something is stolen or lost and NOT in the delivery, and can plan on getting expected items. It is tied to other services, as well, such as package notifications, tracking services, stamp purchases, etc.

1) This is the federal government we are talking about. The FBI, CIA, and a host of other alphabeticals would have no trouble whatsoever accessing this information. There is no indication that such information is not retained indefinitely, and no privacy statement which alleviates concerns over it being used against you down the road should you become a person of interest, or a trouble maker such as a whistleblower, activist, or other targeted individual.

2) The system is achieved with online registry, and is handled by email, currently with no truly secure process for verification of the applicant or notification of the addressee that a subscription has taken place. Stalkers, private investigators, suspicious spouses or ex spouses or lovers with an axe to grind, or anyone else with minimalist information about you and where you live could sign up pretending to be you… again to include someone working for a government agency who could not be bothered with a warrant — knowing that they could later get a warrant and legally go back in time to ‘duplicate’ the effort in a manner which leaves no proof they violated your rights, earlier.

3) this means that mail must be separately sorted one more time by someone into individual stacks to ‘pose’ for the photograph, and then to take the image and email it… or the entire automated system must significantly modified at both the hardware and software level. Both are at great expense and will cost USPS more red ink… and eventually that cost will increase the price of postage for everyone, not just those using the service.

4) If the system is automated (and even a manual system will be, eventually), then it means EVERYONE’S MAIL is being imaged, all the time: The USPS becomes yet one more information tracking and tracing point available to the government, and under the program, anyone spoofing it.

I’m not the only one pointing these things out… though I’m the only one so far who has pointed out 3 & 4. Other privacy experts have echoed 1 & 2, variously, mostly item 2. Too many people PRESUME that government would NEVER use such a service to spy on them this way. That’s what they said about NSA and FBI when they first started.

Defensive Measure?

It appears the only way to prevent anyone to spoof the system to spy on your mail is to beat them to the punch and register, yourself. However, there is no assurance in place that someone could not still additionally register an alternate email identity. We can only hope and presume there is an online software check which would reject any such attempt.

Short of not taking mail, at all, there is no defense against government use of the images, if you are a person of interest targeted in someway by an agency.

https://link.usps.com/2017/08/29/informed-delivery/

Why am I Being Targeted? A Valuable Question for TIs


Being targeted is all about unanswered, yet critical and deeply troubling questions, psychological torture being at least half the intent of targeting. The foremost question is usually ‘Why?’ or ‘Why me?’ There only three answers which matter, and they are not impossible to discern, and knowing can improve one’s ability to resist.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 
What you will learn reading this post:
• there are three primary reasons why TIs are targeted;
• knowing which it is can result in better defensive/offensive strategies;
• it is possible to discern the difference in many cases;
• there used to be a fourth kind, but what it really is will surprise you.
  x

The way it is

Of the 12,000 plus persons reaching out to me over the last two decades because they were being targeted with some form of Political Control Technology (PCT), almost without exception, the first thing asked is ‘Why… why me?’ Naturally, there are endless other questions which are also asked, all of them seemingly unanswerable, and all of them deeply troubling and part of the psychological mind games which are inherent in all forms of mind control.
  x
27419003986.jpegThere were three or four possibilities, and the best answer which could be offered up front was simply to cite those reasons, a generic answer which lead to no peace of mind, and which usually lead to even more difficult to answer questions. And yet, to get to the bottom of things and mount a viable defensive/offensive strategy, such questions needed to be answered; you cannot fight a problem you do not understand.
  x
This is why targeting tactics include significant effort into misleading the TI into thinking all manner of incorrect facts about their targeting. Out of the 12,000, I have only ever encountered perhaps 4 who truly had it right. Defending the wrong problem results in failure, amplifies the power of the mind games through frustration of defeats, and sets the TI up for looking insane (or even driving them to that state), almost always another goal of the targeting, the very means of neutralization, and the best measure of success.
  x
And so, in order to get those answers, I established my free Helps Kit (proparanoidgroup@gmail.com), and its use, in turn, enabled me to offer a variety of for-fee consulting services aimed at formulating appropriate combat tactics. In almost all cases, even if not electing my services, the Kit lead to some improved understanding and ability to withstand targeting. The services almost always amplified that result, and in all-too-few cases, enabled a complete stop of the targeting, usually with some form of remuneration or compensation to the victim through what I term a ‘blackmail insurance policy.’
  x
So YES, it is right to ask why. So let’s look at the generic answer, and see where it leads us.
 x

The Three Answers

I and others used to think in terms of a fourth factor, which at least seemed to be another category, but it is not, by and large. And yet, as we will see, it remains telling and useful. Let’s start with the big three, first.

1) the actual intended use is ‘political,’ which translates as any form of disapproval of the TI which may require punishment or neutralization short of an assassin. Whistle blowers or potential whistle blowers, cult members evicted from, or who quit the cult, etc;
2) ‘experimentation’… extending the state of the art;
3) ‘training.’ Guinea pigs for trainees are targeted in order to achieve across the board predictable efficiency.
   x
What we used to perceive as a fourth reason was sometimes called ‘Joyriding’. In truth, if falls into experimentation, but not upon the TI — upon the perps. Actual joyriding can take place… the unauthorized used of tech/methods for personal gratification… but more than likely, to the abuser, it is in the realm of ‘political,’ to
them at a personal level. But the bulk of joyriding would seem to be experiments upon the perps.
x
93d5bea6cce0329abcf9fc97431684c0.jpgMany perps are themselves TIs, either actual mind control victims or persons (typically sociopaths or psychopaths) who are put into experiments to see how THEY react in a perp situation based on THEIR psychological profile and the specific circumstances of the TI-to-perp interaction/response cycle. In fact, the TI is almost superfluous to the equation, once their suitability has been determined (their profile), and considered a consumable and expendable item in the project — though controls exist to prevent such harms as might result in Police investigations which might defy cover up arrangements.
  x
An easy example is the infamous Yale experiments on authority conducted by (presumed CIA) Psychologist Stanley Milgram, ostensibly funded by CIA under MK-Ultra. There, volunteer students were given the choice of playing teacher or student roles in what was described as a learning experiment, with an observer who was authority over the ‘teacher,’ who was de facto authority over the ‘student.’ The teacher would test the student and punish wrong answers with an electrical shock, increasing the voltage for repeat errors. There were lies in the mix which changed the reality to something else, but in the end, the observer would instruct the teacher to continue the increases in voltage to the level of lethality.
  x
In that study, those playing student were not real student volunteers, but paid actors, and no one was actually being shocked or harmed. But a similar study by Professor Phil Lombardo, the Stanford Prison Experiments, resulted in actual sadistic violence so troubling that it had was made into a motion picture. There, everyone was being studied, but the guards believed only the prisoners were being studied, so the core experiment was focused on them. This experiment, too, is thought to have had government backing of some sort, as this was in the days of COINTEL and COINTELPRO operations by FBI and the U.S. Army under Nixon, a program thought enhanced and behind much of today’s targeting of citizens. In any event, it had been ‘blessed’ by the American Psychiatric Association, which at one time was headed by former CIA mind control scientists (like all such organizations).

Knowing the difference can alter TI tactics

 One needs to fight the right problem. So it is critical to know which reason applies. There are some general defenses which can be used regardless of the form of targeting, but there are also specific defenses which in the end, are likely more productive. While every TI’s situation and circumstances can dramatically impact on exactly HOW to effect such defenses, and especially offensive responses, what follows below are my ‘generic’ answers which are, unfortunately, somewhat simplistic in description. A TI should be very cautious in experimentation trying to find the best way to implement a given solution.
  x
The key most generics which apply to all reasons for targeting, are a bit more straightforward. Chief among them is to increase site security (i.e., pickproof deadbolt on a primary entrance, all other entrances secured such that only breaking and entering is an option — which perps don’t like to do because it leaves physical evidence in support of the victim’s claims of targeting). That can also mean use of video security monitoring systems, security lighting, and so forth. I am not a fan of monitored alarm systems (most such firms have intelligence community ties), but I do like off-the-shelf component alarm systems, perhaps with online monitoring by YOU.
  x
Another generic tactic is to Stop, Think, then Act, instead of simply to react. Instead of reacting to a targeting stimuli or event, STOP: Think about what they want or expect you to do in reaction, and instead, Act (as actor) in some random contrary way. They use your reactions to gauge effectiveness of their methods, and methods are calculated based on your psychological profile. Acting, done believably (don’t over act, don’t elect a totally absurd response) can screw with them in ways which sees them doubting both their methods and the accuracy of your profile, and cause them to retreat to square one, reducing your trouble and giving you a rest period. However, before that happens, you must brace for increased attack levels, until they accept that something is truly wrong.
  x
And, of course, I also advise at least the first two books in the Professional Paranoid series. The Professional Paranoid gives how-to advice with respect to traditional targeting, which is always part of PCT targeting. The second, MC Realities, gives how-to advice about the PCT variety. The third book, The Defensive Field Guide, is simply a compendium of references and resources, primarily educational and especially useful as ‘proofs’ when trying to convince non believers that the technology and history of its use by government is real. Learn more about my books, music, and videos on these kinds of topics using my WordPress pull down menu (page top). Additional blog posts on topic are also available, here.
  x
Political targeting almost always involves a ‘full-court press.’ The victim will likely suffer electronic weapon targeting, gangstalking, dirty tricks designed to destroy all resources, including finances, relationships, and reputation. They tend to be harassed by law enforcement and other civil agencies, and will likely in time discover they have been implanted with various devices to allow tracking, cause pain, provide voices in their head, and perhaps, suffer use of chemicals and gasses. Everyone will seem to turn against them, for they have been turned by the flashing of badges and requests for ‘help’ by ‘investigators’ of some horrible thing (i.e., pedophilia, terrorism, etc.)
  x
The best defense is to determine exactly what thing it is they fear about you such that targeting was justified in their mind (which may be false beliefs about you). It usually has to do with something work related, or if a college student, something witnessed or experienced at school. Knowing the reason for the targeting will give you the who. With the who, why, and how answered, it is often possible to crate that blackmail insurance policy.
  x
But it also may be that you had already been a victim of childhood abuses designed to create split personalities which could be ‘programmed’ to make you into a programmable person (think in terms of a Jason Bourne or Manchurian Candidate). For every Bourne successfully created, there are likely dozens of ‘failures’ which are kept around to become patsies or for fodder in some future plot. Such persons are often targeted to keep them off balance and looking insane in order to prevent exposure of the greater programming project. If you think you might be one of these, contact me for further evaluation.
  x
Experimental targeting almost always does NOT involve a full-court press. It is usually to test a specific PCT or PCT combination. In some cases, this is actually a better experience as a TI, because of that fact. But in other cases, it can mean very exceptional and horrific targeting levels. Where it is the perps who are the subject of the experiment, it is more likely for the TI to have a  yo-yo experience, even seeming lapses in targeting. Finally, another clue is bizarre symptoms atypical from other TIs. This usually means some new, advanced technology is in play. The more ‘crazy sounding’ the experience is, especially against other TI experiences, the more likely is it experimental tech… unless, of course, one actually is schizophrenic. But even that can be a clue (see training targeting, next).
  x
If it is concluded that perps are the true subjects, you can apply the same defense as advised in the training targeting (next). Otherwise, it is hard to give specific advice for something which may not be based on known technology or methods, but it is just as likely to be based on psychological experimentation as it is technical. In the later case, there will be no bizarre experiences (comparatively). In either event, I suggest you contact me and perhaps we can figure out something to try which is based on whatever is going on.
  x
Training targeting will again feature yo-yo symptoms/effects, and perhaps brief lapses in targeting, but the symptoms will not be atypical of other victims. Because it will involve perps who may be ‘stupid’ about important errors that can be made, it is typically used against people who already have some history of mental health treatment. Schizophrenia, paranoia, or extreme schisms are popular ‘excuses’ which can hide any such targeting errors and prevent exposure of the training project. Authorities will presume the mental state of the victim the cause of their complaint, even to the point of ignoring physical evidence, such as burns on the body, which would be thought self inflicted. As in all targeting cases, regardless of type, reason, etc., I advise never to go to authorities unless you have courtroom quality evidence and witnesses or other proofs to counter any notion of mental illness.
  x
Another clue it is training leads to defensive options. One will see a routine change of players, if one can locate the nearby perp operating posts. Training commonly requires at least one ‘instructor’ and one or more ‘trainees’ at a time. They are not family, and are not in the same social or affluence levels, and will tend to seem odd matches for each other, both in dress, and likely, in age. And, there are likely three sets of them to allow three shifts a day (not always – where targeting varies during the day and is consistent at night, the nighttime targeting may be automated), which would mean a lot of coming and going of different people. And, as there will be graduations, there will be a larger cycle of all new people, which may or may not include brief lapses in targeting, or renewed cycles of targeting experience which might be described as starting low and simple, and advancing to high and complex, over time.
 x
The defense is simply to document the comings and goings, and the patterns of electronic attack signals. Rely on video, get license plates, record times, etc. This may enable you to obtain help from authorities, or perhaps to take legal action. But I warn you, the material must be legally compelling, and overwhelming. You will need a lawyer’s advice more than mine.
x

About Death Threats

Many TIs talk about thinking their perps are trying to kill them. Some talk about actual death threats and events which seem to be ‘failed attempts.’ Some reference  deaths which have taken place as ‘suspicious.’ It is true that numerous TIs have died while being targeted. These deaths are not outside of the norms of actuarial tables for a given group of people, given the many tens of thousands of TIs who actively so identify themselves. And as investigator, I have yet to see any compelling evidence of an actual murder, or staged accidents. I know of only one accidental death at the hands of a perp… which would possibly warrant a murder charge… definitely warrant manslaughter charges.
x
So, despite the insistence of TIs, I am equally adamant that murder is not the intent of targeting. Given the resources and skills of who is involved in targeting, if they wanted a person dead, they would be dead. They would not issue a threat or any other kind of warning, they would just get the job done. And, keep in mind that one reason targeting has been developed and deployed for political use is specifically to avoid murders. Murders can result in investigations which have the potential of blowback. But targeting creates a ‘mentally ill plaintiff’ who will be ignored, and is who is therefor a political (and social, financial) zero.
Therefore, where a targeting situation involves such threats, I deem it to mean one of two things. Either the TIs defenses are becoming effective and they seek to deter… using a bluff… in which case it is likely to be in a political targeting situation — or it is part of an experimental targeting project. In all cases, it is a mind game and should be ignored outwardly, while inwardly increasing defensive posture and alertness. If actual attempts are made, that is entirely another matter, and should be documented and likely, taken to law enforcement. Not that they will do anything about it, but it gets it on the record, such that if things become more serious, they might respond appropriately.

Who’s Killing the Bilderbergers?


Some 17 years ago, the Unified Conspiracy Theory was formulated. It was so accurate — it was able to predict in 1999 the 2001 downing of the WTC by jetliners and resulting Middle East Oil Wars, and other major news events. Now it can be seen at work in my newest book on the Bilderbergers — where fact and fiction collide… fatally.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or link to original posting.
 
Upate Feb. 20, 2017 Paranoia Publishing is set to start shipping hard cover copies of this book as early as first week of March. Amazon will carry it right away. ebook copies available direct from author now at half price ($6 – will return to normal price once hard copy is available) via paypal orders to proparanoidgroup at gmail com. 

What led to this book? The definitive International conspiracy.

After ten years of research into crimes of the New World Order, I began to theorize that the bulk of America’s dark bumps in the night were not simply random crimes by assorted forces for varied agenda, but completely orchestrated as a single, logical, step-wise plan toward a single, yet visible goal. It resulting in the Unified Conspiracy Theory, and it was reasoned that if one knew the goal, and the steps thus far taken, such a plan was predictable, and as a theory, the ultimate test would be to do just that.

The first three predictions made with the UCT were so scary, that I had to take actions, do something… anything I could think of, to attempt to thwart them. The first was, that some kind of terror event would bring down the WTC with jetliners, and result in a series of Middle East Oil Wars. So, in the Fall of 1999, knowing no authorities would bother to respond usefully, or quickly, I published a quickly written screenplay featuring such a plot, and put it online with explanative warnings, hoping against hope it might force any such plan to be aborted. No such luck, of course, even though Oliver Stone’s people took a look at the script in search of a project. They thought it an impossible ‘false flag’ scenario.

 

16819237_985524731587546_4614382031226083422_o.jpg

The second UCT prediction was an assassination attempt on 1992 Independent Presidential Candidate H. Ross Perot, or his family, in order to force him out of the Primary run against Clinton/Bush. I took no chances, and this time, notified the Secret Service of my concerns, expecting they would ask me for details. I used my backchannel contact, someone I had worked with before on several Treasury matters. Some several weeks later, Perot did back out of the election, even though the very night he did so, he had won enough votes to be guaranteed a place on the General Ballot. A few weeks after that, my SS contact confirmed that an attempt had been made just before the Primary, against his family; mailed Anthrax. That has its own telling ‘false flag’ backstory.

The third was that there would be at least two more major false flag attacks to follow, specifically naming the type of attacks, and the cities. One of them was my home town, which I had predicted would suffer a bio-terror attack, and I even identified the means of delivery and rogue CIA Fronts to be used. But by the time frame where that might become a more current concern, I had finished my book set, Fatal Rebirth, which spelled these things out quite clearly, again hoping it might spoil any such plan. I also took steps to notify the City.

Again, no useful results, but fortunately, knowing such details enabled me to personally thwart that attack, or at least postpone it. It is featured on this Blog’s home page.  But I was definitely able to thwart second, different terror attack in the same time frame, likely a Plan B to the former. It was called Gas Station Tasking when announced by President Bush; the use of private planes to dive bomb the area’s largest gas station while a tanker truck was offloading gasoline, at the busiest time of the street traffic day. This is also detailed on the home page.

This could easily have taken out two gas stations, four restaurants, two banks, two two hotels, and potentially, two major shopping complexes, and the traffic on the busiest intersection in the County, plus a major Interstate and two State highways. Identified, were two of FBI’s Top Ten Most Wanted Terrorists, and others, including the Christmas Tree Bombers. They were getting help from an FBI Agent known to me, and so, as it was a false flag operation, FBI, CIA, FAA, DHS, in response to my going public, never asked for my evidence, which included fingerprints, video, multiple eye witness confirmations, and more. The cover up was started before the President even heard about it. See home page.

 

Why UTC matters to this new book

Other UTC predictions have since come to pass, as well. The reason this is all mentioned here, at all, is because the UTC does not just affect America, it relates perfectly to World affairs, as well. And in this world, we have various Round Table Groups of Globalists who push for a One-World Government, which is to say, elements of the modern-day Illuminati. Such groups as the Tri-Lateral Commission, the Council on Foreign Relations, and the Grandaddy of them all, the Bilderbergers, and many more (even United Nations, World Bank, et. al), all tend to be cut from the same New World Order mold.

suiciding-the-bankers

This image relates to one of two strings of real World International murders footnoted in Who’s Killing The Bilderbergers, as cited in this book. From http://humansarefree.com/2016/06/mainstream-media-finally-admits-mass.html

 

Which in turn is to say, largely fascist, all-too often satanic, and decidedly power elitists seeking to rule the World through manipulation and control of (everything), and willing to do so at any cost, by any means. Not to go overboard, it is important to note that, with the exception of the Bilderbergers, most Round Table Groups, like FreeMasonry, attempt to draw in newbie membership who are completely innocent Sheep. This gives surface viability and credibility of these groups to mainstream in ways which allow them to mask the darker roles they play in seeking the Globalist rule, while also giving fresh students to draw into their world, especially the more successful up and comers. There is a backstory there, as well, as I have first hand knowledge, x 2 telling examples, having been such an up and coming business man.

Ergo, this new book is designed to do much the same thing as Fatal Rebirth; to warn you just what these people are doing, and why… and why you should be mad as hell about it and doing something to stop them. Only, my new book is global in scope, where Fatal Rebirth concerned itself only with America. And, while Fatal Rebirth began unfolding in 1947, Who’s Killing the Bilderbergers is a current-day affair. As such, it is perhaps more urgent, that you read it, and soon — because the future is revealed to be bleaker than the Dark Ages and time of the Inquisition, for those not forewarned and forearmed.

 

The plot thickens

I describe this book as ‘an International Novel of Novel International Affairs.’ A grand murder mystery across multiple Continents, trying to resolve mysterious death after death of prominent Globalist leaders. Are they simply random deaths by happenstance, or murders by elaborate design? Officially, they are not due foul play, and yet… each one has many unanswerable questions clouding that view. Just as troubling, their deaths seem to be tied to various strange conspiracy theories, while at the same time tied to various Globalist agenda, either narrative affording motive for murder. And, of course, it is soon enough discovered that they all turn out to be Bilderbergers.

bilderberg.jpg

Each Bilderberger tends to be an Officer or Board Member of multiple corporations, and has sway over yet others through major stock holder positions, or contractual agreements. Of course, many of these companies, in turn, control other companies, sometimes, long lists. Now, imagine what this Cloud Map would look like if we knew the actual identity of ALL Bilderbergers, and not just this handful. Then add CFR, Trilateral Commission, Club of Rome, Council on Foreign Relations, and on, and on; the Round Table Globalists; the modern-day illuminati.

By the time the truth of the deaths starts to be uncovered, the UTC will have started to reveal itself in action. In like manner to UTC’s ability to be predictive, readers will be propelled quickly into the future, headlong into the one final prediction which is the ultimate form of fatal rebirth… for us all. That particular prediction WILLmost certainly come to pass; it has, after all, been foretold by many authors well before my time. Among them, Satanist and high Mason, Adam Weishaupt; it is the entire purpose of and predictive goal of the Illuminati Plan, as he formulated it in 1776, when the group started their journey toward a New World Order (he first coined that term).

As this book reveals, just when it comes to pass, is largely up to you. You, are what you’ve been waiting for. They hope you don’t know that, and remain Sheeple.

 

An important detail

And, along the way to that story-ending element, readers will also encounter countless real-World conspiracies laid at the feet of Bilderbergers, all done in ways which let the individual decide for his or herself, which, if any, may seem fanciful, and which are more likely true.  There is much documentation within the main body, plus more than 150 footnotes (an average of one every page turn), to help that process along. Some of those footnotes are illustrated graphically. The Climax and Ending will then show you the progressional nature of the Globalist plan as it unfolds toward the very last step in the plan, the point of no return for Mankind. These conspiracies back up the UTC usefully, and in fact, understanding them helps refine the UTC more usefully; one tends to validate the other, in both directions.

 

 

 

TI Defense: 30 Tips to Help Fight Back


If there is one thing I’ve learned after having contact with 12,000 Targeted Individuals over some 25 years, it is that without help, they have no good chance at properly dealing with their targeting. There are many reasons self help fails, and yet the solutions are not that complex.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or link to original posting.
 

The TI dilemma

I have never met a long-term Targeted Individual (TI) who did not have the same generalized and massive array of problems. The easiest victims to help were those who had only recently become aware of targeting, as their problem list was much shorter, making defensive solutions easier to derive and implement. But for everyone else, the list of issues was, well, mind boggling. I would see it in the very first communication (typically email or letter). It would be as if a letter about life from Lil Abner’s (by Al Capp) character, Joe Btfsplk, who never had a good thing happen to him or anyone around him.

JoeBtfsplkPanel.png

Note: I am no longer in a position to offer such personal helps. I do still offer a free Helps Kit by email which is useful to the TI in multiple ways, and I’ve written many how-to books on topic which are quite detailed and useful, to date still the only ones of their kind, as far as I am aware. I am still open to email contact at proparanoidgroup at gmail com, and can field simple generic questions, but I no longer engage in situational analysis and tactical advice, investigations, or direct intervention. This post is intended to help take up that slack.

That first contact would be pages long, typically, in story telling mode, and full of unhappy emotion, a hard thing to read; both in terms of eyestrain and emotional drain. Paragraph after paragraph of one problem or targeting issue after another. There would be a long list of events and suspect perps (perpetrators). It would commonly entail problems with their job, their family, their church or other membership, their neighbors, the cops, the legal system, the medical system, their financial situation, their computer security, and more, to include actual targeting symptoms impacting their health, and at times, the health of their pets and their plants.

The effects would be physiological, emotional, mental, and in some cases, impact physical objects. It must have been even harder for them to compose it, than for me to read it. Each such effect might entail a variety of individual symptoms and clues as to cause. Oddly enough, typically NON OF IT IS USEFUL in providing helps. Their valiant and painful plea for help ends up being little more than an exhaustive rant in terms of value in a practical investigative analysis. The ONLY way to tackle targeting usefully, either as a helper or as a victim, is to start completely over, which is why the Helps Kit was evolved; it started over in a way which simplifies, organizes, and quantifies useful information.

A Detective investigating a crime does not want to hear the long drawn out account of the victim up front. They start with a GENERIC description of the nature of the crime from the Cop on the scene (who did get that account from the victim), and then they INTERVIEW the victim with SPECIFIC simple questions aimed at nibbling away at facts in order to find the ones which represent CLUES. “What did you see? What was said?” and so forth, each question hopefully suggesting another. They then use the answers to solve the crime. A good model for helpers and TIs, alike. A flood of data drowns the truth, but point-by-point realizations build toward it.

There is another problem. While their described symptom or effect may perfectly match a known Political Control Technology (PCT) or method, it is also absolutely true that each and every example could also be due to a natural medical situation, or have a simple but yet as unknown social, or financial cause. Since authorities and professionals who are the natural ‘go to’ for help prefer not to believe in the Boogey Man, the assumption is always that a natural cause is to blame. A wise TI would do the same, seeking to eliminate any such possibility.

Failing the wisdom creates more problems for the TI, even when the go-to helper cannot find the natural cause or address it, because it is next easiest to blame the TI for the problem, even to the point of accusing them of being a paranoiac schizophrenic; the easy out. For the record, when working long term with a TI, I will in time discover the truth, and the truth is, purely imagined targeting among those reaching out to me has proven quite the exception. But some might be delusional, of course, but I’ve also learned that persons with mental issues are often selected for targeting in training projects, so that any serious mistake by trainees will be far less likely to draw interest of authorities, who will make the assumption the whole thing was imagined.

 

The bigger problem

packedmeal

Targeting: The covert Elephant in the Room which must be devoured if to well survive, but HOW?

As result of all these things, a TI is faced with so many problems, and so many clues, that they can literally find themselves immobilized by confusion, unable to reason it out, or even unable to cope. And yet, there is always one more problem, far more serious than the rest: they do not understand the truth of their targeting situation. I’ve never known a long term TI who did not have a false belief as to the nature, cause, purpose, source, and method of their targeting. This is by design, a primary goal of targeting; to create a false belief structure which makes it impossible to defend against, because defenses will be aimed at the wrong problem.

This further makes easier another primary goal, to make the victim seem crazy, either by their reactions being seen as paranoiac, or by telling others things deemed insanely impossible. But to underscore, the biggest problem is that their defenses will not meet the need, resulting in failure and frustration, a tool for their tormentors. So, finally, they come to me in a desperate state, not just in terms of needing help, but in terms of simply needing someone to listen to them and actually believe their story.

No one should presume a TI’s story to be imagined or fake, though it is true there are some who pretend for ulterior motives. In time, the truth will out. But because of their failure to truly understand the nature of their targeting, they might have been led to believe almost any untrue thing which cannot be seen as rational. For instance, one victim (who was schizophrenic, as well) believed they were beset by Alien vampires. In truth, the targeting was evolved against the person because they had discovered a firm involved in illegal dumping of biohazard materials, and to insure that her story was not believed by authorities, they led her to so believe. They relied on her schizophrenia to protect them from discovery both as perps inflicting mind control, but as criminals violating Federal law. The schizophrenia, itself, made that easier to accomplish.

 

How to eat an Elephant

The old saying is, one bite at a time. Here are the bites, a series of axiomatic advice points presented in a somewhat stepwise manner, the same things I would normally work through with every client. Remember, only you can decide any risks involved, and take the wisest course of actions based upon those perceived risks. This is merely a guideline of what has worked well in the past, and is generic in nature…

  1. Acknowledge your belief structure has been manipulated and you do not likely truly know the who, what, why, and how of things; you have been deliberately mislead. Following this guideline should help address that flaw, but only if you remain open to the possibility. Educate yourself about PCT and know your enemy, and always seek and eliminate any possible alternative explanations — but also keep in mind the pitfall cited at this post’s end;
  2. Be wary of professionals which we should otherwise rely upon, such as doctors, lawyers, dentists, and private investigators. Most will either walk away or take advantage of you on the assumption you are crazy, or worse, seek to have you evaluated by mental health professionals. The best strategy regarding that, is to seek an evaluation on your own: a written clean bill of mental health can be a wonderful defense if eventually accused of being delusional, even if by authorities. If you must find a professional, including a therapist, your best bet is to go to a city at least 50 miles away, and find a relatively recent graduate (i.e., a lawyer new to the Bar), of some minority race. They are likely to be hungrier for work, and more anxious to do a good job, and less likely to have had their morals corrupted over time by the industry. Avoid saying you are targeted, just tell them your concern and enough facts to get their interest. Answer their questions, but where a question requires an answer which gets into targeting details, give the details, and offer no presumption of cause, even if asked. Let THEM make that conclusion on their own, or not — it should not change how they perform for you;
  3. Cops, on the other hand, will either instantly so peg hole you, or worse, turn out to be in place assets working with the enemy against you. If you MUST do so (as in reporting a crime), or if you choose to become a TI activist or otherwise ‘go public’ (includes any Web presence), follow the advice found here;
  4. Start and maintain an event log. Use a voice activated (VOX) recorder kept on your person to make verbal notes describing questionable events, suspect persons, vehicles, etc. Leave it on to capture events directly, automatically. Transfer this at days end using headphones, to a computer spreadsheet or database file. It should include Time, Date, Location, Description, Details, and your emotional or intuitive thoughts at the time as to what it might mean. Compare new events of the day with older events, looking for patterns, frequent appearances of the same person, vehicle, etc. With respect to persons, give them a ‘code name’ based on their appearance or behavior until able to acquire their actual name. For vehicles, do get plate numbers, but since plates can be replaced or stolen, also note vehicle damage, stickers or decals, and the like. This will help you get closer to the truth of your targeting, and may be useful as evidence at some point;
  5. Remember that if you have a pattern in your life (such as going to work the same general time of day along a given route), so do others. Do not be concerned in such routines to see others around you repeatedly, because other people also have routines which may overlap with yours. DO be concerned if seeing the same person/vehicle at disparate locations and times when out of routine, and especially if also noted while in routine;
  6. Establish site security at home, and to the extent possible, work. My book, The Professional Paranoid will help, but in general, you need to insure no door, window, or opening can be accessed from the outside, even with a key, without breaking and entering. Perps don’t like to do that, because it leaves proof you are not imagining things. The only entrance that should be key accessible, should be via a pick proof deadbolt lock. Put one on your garage door, as well. If you can, install security lighting and a video monitoring system. Protect rooms and entrances or items with simple alarms, and employ and document any trip traps you set per the instructions in my book;
  7. Establish computer security AFTER site security. Backup all files, wipe the hard drive, reformat, reinstall OS, set new password, reinstall apps, restore files. Discard wireless keyboard. Disconnect from Internet. Buy cheap used iMac and set it up to be a local server, connect it to the Internet with Web sharing turned on, connect your main computer to it. Download a Web security monitoring utility to run continuously on the Mac, check it daily. Reset your router/modem to factory specs, install new password. Repeat this process and reset and all passwords regularly, do not use same PW for all. Consider to join the Free Will Society, a closed Facebook Group I maintain (application is via the Helps Kit mentioned in the Note near page top), or any of the many public TI Groups on FB (I am member of many);
  8. Improve personal security, starting with phone. NO CELL PHONE IS YOUR FRIEND. Keep it in a foil pouch, turned off when not in use. Where that is not practical, remove battery and install only to check for calls to make calls, or other use. If a smart phone, there are a number of apps I suggest you install. Mobile Justice from ACLU; an aircraft tracker that sees transponders; Spectrum Analyzer and/or EMF Detector; RSOE EDIS notifier; iTriage health advisor. You MUST disengage certain features. Cary a camera ready to go (not cell phone) and voice activated recorder to document events. More advice in my book, including land lines and general bug detection;
  9. While observing (3,4), avoid trying to deal with the sum total of the problem. It becomes a matter of ‘too many clues,’ per the introduction of this post. Instead, choose any ONE. Then review all others for any which seem related, aligned, supportive, or opposing, and set them aside for study as a subset. Analyze these, alone, formulate a means to prove or disprove each clue, and based on those results, validate, reject, or find the subset unresolvable, and move on to the next subset;
  10. You MUST presume any physiological symptoms are potentially actual health issues and seek a Doctor’s advice. When doing so, do NOT mention targeting, but it is OK to mention external symptoms (pets, plants, etc.) as might possibly be related. Pursue any suggested treatments until no treatment proves useful. ONLY THEN will you know the truth, and be closer to true understanding of your targeting, andy you may actually improve or cure actual health problems as well. Along these lines, anything you can do to impact your physical, mental, and psychological well being is to your good — become a health nut and try everything that claims a benefit, as everyone’s situation and physiology is different, but products seldom attempt claims of addressing targeting effects; you won’t know until you try it — but try only one new thing at a time, or you won’t know which is responsible for good outcome;
  11. Deal with Gangstalking. Very simple. Ignore it. It is only there to jerk your chain, and that only happens if you allow it to happen. You can choose not to be upset, worried, etc. Document it, yes, but laugh at it and them for wasting their time and money. This is simple in concept, and yet hard to do because of human nature. Stop, Think Act, practice, practice, practice;
  12. My book MC Realities offers a very good review of how to detect, identify, and deal with PCT. Once a better understanding is obtained from he previous steps, you can start to defend yourself more usefully with these trial and error methods, which should give you some good specific truths about your targeting.  In general, we worry about implants, which can include voice to skull (V2S), Directed Energy Weapons (DEW) which cause physical harms, mood/sleep control; and other electronic tech which can also account for V2S. The precise defensive/offensive tactics will vary to type and specifics. Shielding is almost always the best defense, but there are so many factors that the easiest thing to do is to shield an entire room for a few hundred dollars, but other methods should be tried first, as that is where the targeting truths can be learned. Where there are problems still encountered, feel free to contact me;
  13. If your targeting involves pain inducement DEW, or you have actual medical conditions which cause pain, ask me for my Jedi Mind Trick, the best way to describe a method I have developed which allows one to mask pain with nothing more than the power of their mind. It is difficult to master and requires practice, but once mastered, it is easy to apply, and for some users, it can also turn your body into an EMF meter for advanced warnings of attacks, and has application to general problem solving, including the issue of true understanding of the targeting’s nature. I use it to eliminate pain from toothaches (a Molar who’s roots were growing through my gums, into my mouth, and into my cheek), burns, fibromyalgia, and even tinnitus, and I can use my hands to find power lines in walls, as well as microwave and EMF sources. Demonstrated it many times;
  14. Once defensive efforts are well in hand, there may be some significant offensive opportunities. These are outlined in my books. Should you think any are appropriate, feel free to run your ideas about implementation by me for fine tuning or other commentary;
  15. As a rule, a TI has no concrete knowledge of the reason why they are targeted. Exceptions tend to be incorrect, as earlier mentioned. Knowing the who and why us the key-most truth, as it can sometimes lead to establishing a blackmail insurance policy. This key can sometimes be discovered in memories.  Go back in time in your mind to a point roughly six months to a year prior to first noticing your targeting. You would be looking for some odd or unusual event or thing overheard or seen. It might be an argument or a document or a conversation which, at the time, did not make much sense to you, but stood out as unusual in some way. Almost always, it is a work related memory, especially if your work had some relationship to government, intellectual property, high finance, or high profile legal matters; the sort of place where conspiracies and dark crimes might hatch, take place, or be evidenced. Should you find such a memory, contact me for general advice on how to verify its usefulness and take advantage of it;
  16. Where defense cannot be well achieved or maintained, relocation can typically buy several weeks to months of temporary relief. Often, simply going mobile can offer at least partial, if not full relief for a time, especially when not in your own vehicle, and leaving behind all personal possessions (new clothes, luggage, etc.) and taking no phone, NOT CALLING ANYONE, visiting online accounts, or purchasing anything on a card. For a more permanent solution, consider residency at Free Will Haven, a targeting-free self-sufficient and low-cost intentional community project of the Free Will Society, which is based on tiny homes living. I myself have been living quite comfortably in about 120 square feet (excessively tiny) for the last three years, and am quite content to do so, sacrificing little in the way of lifestyle, otherwise. Again, an application is contained within the Helps Kit mentioned in the Note near page top.
  17. Be prepared for local, regional, national, or even global social turmoil, be it disaster, civil unrest, martial law, real or false flag terrorism, revolution, race war, or political or financial upheaval. PCT has been being ramped up in terms of victim numbers (some estimates place the national number as high as 12,000,000) and individual intensity. It is my belief that the reason so many people are being targeted and the targeting is increasing, is we are heading to a crescendo designed to amplify any crisis turmoil in order to enable a shift in government form, all in the name of restoring national security and social order. Arrange to have a 90 day supply of food and emergency supplies and basic tools. Leverage your preparedness with a visit my special Facebook pages and review each post found there: the Post Apocalyptic Library of portable survival how-to knowledge; the Post Apocalyptic Local Area Defense Network, especially useful to TIs even without a crises event; and the FEMA, Martial Law, Revolution Database;
  18. Consider dropping off of the Grid; escape the Matrix (there is an actual matrix involved), perhaps even with a new identity. This is seldom possible while still being targeted, but the attempt, if done properly, can buy you significantly more targeting-free time before you are reacquired. This two-part post can help.

 

Additional advice

There are also some common mistakes that TIs make which can be avoided. Oddly enough, almost every TI has already made them, and yet, tends to continue making them, failing to see the risk they pose until till late. Here is a summary list, but remember, there are no hard and fast rules. There can always be an exception. If you think you have encountered one, contact me for review to see if I might not agree, or why not.

  1. NEVER seek help from authorities or ERTs due to targeting, itself. If an actual injury or crime is involved, such as vandalism, death threat, theft, etc., by all means report it, as having it on record can be useful evidence of targeting for possible use at some future point — but do not mention targeting concerns, and once more, follow the guidelines found here. If questions are asked as to why someone might undertake an action against you, you CAN mention that there have been strange things happening and you might choose one or two examples, if asked to cite them, but state you have no understanding as to why anyone would do so, and that you have no suspects (even if you do). The last thing you want is an investigation which concludes you are mental, which is where it almost always will end up going the moment you deviate. It may be wise to apply this rule to friends and family, and certainly to co workers, as you can end up destroying relationships with disclosure. The only exception should likely be limited to those living with you, and even then, you will pay a price. I lost a wife and a foster daughter to it, and possibly another daughter;
  2. NEVER react to targeting stimuli if you can avoid it. Train yourself to Stop, Think, and ACT, do not REACT. You, STOP yourself from reacting, THINK about what they are trying to cause you to do (i.e., get angry), and the ACT contrary to that in some random manner. This both negates the purpose of the targeting, and causes perps all manner of concern, either about the validity of the psychological profile they had prepared on you in order to determine the best targeting methodology, or the operational reliability or skill of any equipment or perps involved. This can at times lead to dramatic increases in targeting efforts, but if you continue the ploy, it will lead to them trying to ‘repair’ whatever problem they think is the cause. That typically results in a small rest period of no attacks. Eventually, it can destroy the effort entirely, especially if this method is applied by someone in early targeting, as it prevents them from advancing to other kinds of targeting, or they advance and abandon the failing method(s). This, and use of the Jedi Mind Trick, and numerous blackmail insurance policies (each time I created one for a client, it protected me, as well) is how I have managed to negate nearly three decades of attempted targeting and its consequences; I do not consider myself a TI, because I keep winning;
  3. NEVER be overly concerned about death threats, being followed, or about gang stalking events, it will simply make you wax paranoid, and be seen as such. The people who engage in PCT would simply kill you, not threaten you, if they wanted you dead. Unless a threat was quite specific and included a warning that you should do or not do something, ‘or else’ vividly described, it has no basis in any real threat. If you get a threat with such a basis, that basis must represent a clear and present danger to THEM, in order to be valid. Telling you to stop being an activist, or stop investigating why you are being targeted, does not count, unless perhaps, you have gotten to the point where you can CLEARLY identify and prove with legally useful smoking-gun caliber evidence the who, why, when, what and who of it. In such a case, you have the makings of a blackmail insurance policy which can not only counter the threat, but force capitulation and even remuneration for your troubles at their hands. That was how I ended my first targeting, and was offered $40,000 per my demand. It has become the model for all client help efforts ever since. Being followed or gang stalked is merely a jerk-your-chain tool that goes back to Stop, Think, Act. The only real danger is in giving into it. The only targeting which is a real threat is PCT based on electronics of one kind or another, chemical or biological assaults, physical abuses (i.e., rape, beating, accessing you while you sleep), and dirty tricks which impact finances, relationships, reputation, and the like;
  4. NEVER presume another TI, TI activist group or organization, or general Web resource to know what they are talking about regarding PCT or solutions, for the likelihood they have it right is very low. Take it with a grain of salt, and tuck it away for comparison to other resources. Books are a far better bet at getting at the straight dope. Older books will by now have a reputation establishing usefulness. Avoid newer books or other sources by anyone claiming to be an insider, ex intelligence operative, or other ‘expert,’ as they are likely providing disinformation to insure you continue to fight the wrong problems;
  5. NEVER hook up with another person, especially another TI. There are many reasons this is important advice, and I assure you that the risks you undertake with even a casual date or one night stand is significant. I see it play out again and again. Rare is the TI that can better their circumstance by not living alone, and a sexual adventure is far too easily a set up opportunity of one kind or another;
  6. NEVER pay money to anyone offering implant scans, ‘scientific’ testing, or new age solutions without EXTREME CARE; it is likely a scam, even if there are YouTubes or personal testimonies, the likelihood remains high. Research, research, research. Even if you actually did locate an implant by some method, the number of people able to have an implant removed can be counted on one hand; the medical industry will not cooperate. I have yet to see any positive results from testing services or new age approaches, but if you want to submit a chemical sample to an actual laboratory for chemical or spectrum analysis to find out what it is, that is worth the time and money;
  7. Avoid participating in poorly conceived TI activist efforts to outreach, or outreaching directly yourself. By poorly conceived, I mean an effort which does not heed the advice employed here. At best, such efforts defame and set back the TI movement and each person associated with it, labeling them as mental. Many of these efforts are designed and promoted by perps, and used as a kind of ‘evaluation survey,’ especially those asking you provide personal histories or statements. If legitimate, such statements will tend to seem crazy to anyone not already believing that targeting is real — adding another ‘crazy story’ to a stack of them will not change their minds.

 

Other facts to consider

The following may temper your views in seeking full understanding and formulating defenses. Simply keep them in mind when reasoning things through.

  1. Many perps are themselves victims of mind control, typically the worst kind, the Monarch/MK Ultra kind. They know not what they do, literally; they are programmable people based on multiple personalities which can be triggered at will. While some perps are psychopaths, these, are not, though they my be controlled to exhibit the same behavioral traits;
  2. You may be such a programmable person, yourself, and like them, not be aware. If such a person, and also targeted, you represent some form of ‘failure’ in the programming, and the targeting is designed to neutralize any damage you might cause to the program if you become fully aware of your true situation, which is a real possibility as you work through understanding and defensive efforts. The important and terrible truth is, that such a person will sabotage their own daily efforts in this regard, and make no progress whatsoever. Such a person will likely exhibit many additional symptoms as found in my book, MC Realities. Most notable among these is a question or belief they were targeted or abused as a child, or themselves have  abuser thoughts or have so abused. Should you come to suspect you are a programmable, you should contact me for special advice too complex for this forum;
  3. All PCT is Satanic in nature, origin, and intent. Your enemy is as forecast: Powers and Principalities, and there is scientific proof available. Therefore, your best ally is religious faith, and the best faith for the purpose is Christianity, and the best Christian Church (because it is acknowledged to hold closest to God’s Word in the original Greek and Hebrew translations) is the Wisconsin Synod of the Lutheran Church. There is a whole chapter in my book, MC Realities, which explains exactly why this is true in both practical and Biblical terms;
  4. You will hear it said all the time, that TIs fear they are being murdered, or that they have been murdered. THERE HAS NEVER been such a case. Being a TI can certainly mean to be suffering in great pain, and it may certainly to some, at times feel like it has the potential to kill. But thus far, the only known deaths of TIs have been from suicides or accidents, or natural causes such as old age or disease, according to official records. While it is true that there are ways to fake such deaths and such ways are known by our enemies… and it is true that some potentially deadly illnesses such as cancer may be caused by targeting… death is NEVER the goal. They invest perhaps a quarter-million dollars a month on a full-time TI. There is no point in killing off such an investment. So the only deaths which bother me are the suicides, because that kills not just the person, but effectively the soul, as that is the only unforgivable sin; a sin against the Holy Ghost. If you give in to it, you are surrendering to your enemy, Satan, not just the perps. I am in communication with literally dozens of persons who have professed to have been being murdered as far back as 1992 or so, and they are STILL HERE, some of them still making the claim from time to time. Only two out of 12,000 are known to have died, one of old age and disease, and the other in a traffic incident;
  5. There is no place one can go where targeting is not likely to follow within weeks to months, save one or two foreign countries. The only one of these that has been verified by multiple TIs, is Ecuador, which to me does not make sense, but it seems to be true, with three such instances reported to me personally from TIs I had vetted as legitimate TIs.

The Pitfalls of Presuming TIs are Schizophrenic


After working with over 12,000 persons coming forward for help with targeting over the last two plus decades, I’ve learned a good deal more than just found in my earlier books. There has never been a Targeted Individual who has not been accused of schizophrenia. While that can be true, it is often not true, and even when true, targeting may also exist. The issue must be dealt with head on, and with care, lest it become a stumbling block beyond cure.

by H. Michael Sweeney proparanoid.wordpress.com    proparanoid.net    facebook

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Updated March 1, 2017: General editing and additional commentary and color coding of text for improved clarity.
x
What you will get by reading this post…
• Targeting symptoms generally match schizophrenia symptoms;
• most people, especially professionals, automatically ssume schizophrenia;
• true or not, the possibility of schizophrenia should not be ignored;

• there are good and bad ways of addressing the problem.

First impressions DON’T count

When I’m first contacted by stalking victims for help as online consultant, the stories told me tend to border on what people unfamiliar with the subject would think impossible. The ‘natural’ conclusion, especially for professionals in health care, law enforcement, or governmental authorities such a person might turn to for help with their enemy and/or suffering… is that the person is suffering something in the realm of paranoia or schizophrenia. That is not always wise, but unfortunately, it is quite unavoidable, and for two reasons.

mkultra_page_001The first is that the symptoms of targeting are by and large identical to those of schizophrenic episodes. Hearing voices or seeing things no one else does are perhaps the most well known examples, all things that can be simulated with advanced electronics; voice to skull can be achieved by multiple methods; Sound Canons and other tricks can create otherwise unbelievable visual aberrations. But also, the general belief of claim that people are following, spying, or threatening, especially in numbers, is seen as a symptom. Enter gang stalking methodologies.

The second reason is less coincidental. People simply don’t want to believe in the Boogeyman, especially officials and other professionals, because trying to deal with something they can’t see evidence of being true is beyond them. That is their failing, often a thing wrongly taught them in their training. Often, that training was crafted by people who helped develop targeting methodology, former CIA mind control scientists. This has been well documented in many books, some of which were written by retired CIA types, and as referenced in my own book on topic, MC Realities.

This is especially true of the DSM series of mental health manuals, because at one time and even currently in some cases, the history of heads of collegiate psychiatric departments and EVERY professional association to which a psychiatric professional could be member… as well as Industry watch dog or promotional organizations… can be traced back to the original CIA mind Control Experiments as CIA employed researchers. As they die off, new ones are recruited, and the false narrative… a ‘lunacy’ about lunacy, goes on.

When Congress investigated CIA (and other agencies) in the Church and Rockefeller Committee hearings in the 1970s, CIA officially (claimed*) they had already shut down such programs because (they claimed*) they did not work. They then quickly scattered the CIA scientists involved to form three kinds of groups:

a) institutional and professional groups which insisted MC did not exist, did not work, and that anyone thinking otherwise was mentally ill or, in the case of professionals, guilty of malfeasance or malpractice;

b) like groups which pretended to seek and ‘help’ victims of MC; and

c) into key positions of power and authority within the psychiatric professional associations (all of them), and collegiate Psych departments, where they not only taught the preferred view about mind control, but also helped to write the DSM series of ‘bibles’ used by shrinks in diagnosis/treatment.

*Claimed?

Ironically, the most notorious of group (b), above, was the Cult Awareness Network; CAN, which was consistently called upon by government to help ‘resolve’ crisis arising involving the so-called ‘suicide cults.’ CAN has since taken over and operated by the Church of Scientology, seen by many as a mind control cult in its own right. This was a favorite area of CIA mind control experimentation, trying to find ways to get large numbers of people to kill themselves as a collective. Read Psychic Dictatorship in the U.S.A., by Alex Constantine, for a long list of such experiments. Alex, by the way, was targeted for his writings, and went into hiding for a time. The other purpose of group (b) is to recapture persons who may have escaped mind control projects or who, due to mental issues, may become good subjects as training fodder, and brought into such projects.

What makes it ironic is that CAN advice and helps (pre Scientology) consistently resulted in the mass deaths of those being helped, examples being WACO and JONESTOWN. In both cases, the CIA plants within the groups ‘miraculously,’ managed to survive unharmed, and quite by ‘coincidence,’ the leaders and core members of those groups had previously been in spheres of influence of MC scientists in group (c), above. More could be said about such things, and have been, in MC Realities, Alex’s book, and others. But starker proofs such claims are false exist.

In my first book, The Professional Paranoid, I cited in the Appendix some 400 CIA fronts and influenced organizations which predominantly predated the Church/Rockefeller hearings. Almost exactly half of those had to do with Mind Control. CIA book vanished that book by buying all available copies from suppliers, having one of their own publishing fronts invest in my publisher with the proviso my book not be reprinted, and then ‘selling’ used copies for nearly ten times their face value so that people who had copies would sell theirs for a bit less… and then buying all those up, as well. It is a common CIA trick.

But my publisher was a good guy and he returned the book rights to me, something CIA had failed to think of specifying he not do. So I now effectively ‘self publish’ using print on demand for hard copy (through paranoiapublishing.com), and ebook versions directly through me (proparanoidgroup at gmail com. This makes it impossible to book vanish. Subsequently, in my third book in the Professional Paranoid Series, The Defensive Field Guide, I included 1,000 CIA fronts, almost all of the additions coming into existence post Church/Rockefeller hearings. Guess what? STILL — over half of them were/are involved in mind control related operations. CIA lied to Congress.

The unexpected result of my books was that they sponsored a flood of requests for help from victims of targeting. The overwhelming majority of such requests were from people suffering some form of mind control technology or methodology, most notably, organized ‘gang’ stalking, and/or Directed Energy Weapons (DEW). As result, I felt obliged to attempt to offer professional online consulting services to attempt to help such persons.

This is a very difficult thing to undertake for more reasons than just the communications issues forced by being limited to dialogs at distance without more personal on site direct involvement. While I also offered direct intervention services, they were always beyond the financial ability of the victims; mind control is never worked upon the wealthy unless they first attack and destroy the victim’s financial underpinnings.

Early on in offering such helps, and even in trying to sell my books in the first place, the issue of mental health questions loomed large due the Boogyman Disbelief Syndrome. BDS is a form of mental illness (not found in the DSM, of course) which causes professionals to ignore facts in the Congressional Record, scientific papers, patents, and books by endless authorities on topic, and insist therefore that persons claiming to be targeted are ALWAYS mentally ill, per the DSM bible they worship; they live and work as if in a cult, themselves victims of a form of mind control, the very thing they deny exists.

I have personal proofs I can speak to, as well. I ask professionals who think only schizophrenia possible to explain how it is that, with my defensive and offensive tactical advice, it is possible that some TIs have obtained the ultimate relief? By that, I mean total ending of their problem in ways which prove it was not a mental issue. The proof being in the form of paying huge sums of money by those guilty of targeting as retribution, and/or providing ‘dream jobs,’ record contracts or book deals, and so forth.

The Elephant in the room

dsm-grows

The Bibles of the ‘Psychiatric Cult’

That unhappy irony aside, Virtually ever TI, if telling their story in full, will make claims they assume to be fact which seem impossible to the listener, especially if unfamiliar with the topic. After thousands of such stories, even I can still be surprised. As stated, the natural conclusion is some form of mental defect in need of professional care. Especially if the listener is a psychiatric professional; the DSM tells them what to believe true — that schizophrenia is the only possible cause for targeting claims.

It was therefor proper that I early on advised that some form of schizophrenia or paranoiac affliction must always be considered a possibility. However, I also told clients that EVEN IF TRUE, it did NOT mean the person was not ALSO targeted, something no psychiatrist seems able to ever consider possible. In fact, that TI circumstance is actually quite common in my decades of experience of working with TIs. I therefore chose by policy to ignore any and all clues of potential mental health in any decision to proceed to offer helps. The only SAFE presumption by ANYONE professionally offering help is that targeting must be considered and investigated. To do less could leave one legally liable.

One additional reason to so proceed exists, and it is unique to true targeted persons. One of the primary goals of targeting is to reduce them to a political, social, and financial zero, and the main method employed is to make them LOOK insane, as quickly as possible. One way to do that is to mislead the victim into believing things true, which are untrue. Therefore, any general belief expressed by a TI which seems unbelievable may be explained by this fact, and is yet one more reason not to dismiss the claims as baseless; they are in fact, mere symptoms of targeting as much as of potential schizophrenia.

There are countless ways this can be done, and two key benefits are derived by the tactic. The first is that the implication of insanity is achieved, which leads to denial of helps even from loved ones. Destruction of personal relationships and other help resources is also a primary goal. The second is that the TI will end up fighting a non existent problem, and in making no headway, more quickly succumb to giving into feelings of defeat, breaking their will to resist. IT IS A TRAP, one I never allow a victim to fall into.

I have, therefore, never turned someone away regardless of how much it appeared their problem was mental. For one thing, it was quite often found true in time that persons with various mental issues were (and are) deliberately selected for targeting because of that fact, especially if the purpose of targeting is training exercises; any mistakes that might end up involving Police will be immediately dismissed on that same ‘presumptive’ basis. So it is absolutely possible that targeting and mental health issues are present in a given TI’s case.

cover-1.jpgSo I always tried to early on include dialog on how to best address the possibility of schizophrenia and PROVE the answer, whatever it really was, one way or the other. If TRUE, it would be best to get treatment and resolve that issue, first. RARELY is anyone willing to take that advice; they find the prospect too scary, because of the history of psychiatry being rather prone to forced institutionalization with horrific results (as exemplified in One Flew Over the Cuckoo’s Nest). Such hesitance has not seemed to matter that much, because after working with someone for a while, I am eventually able to discern the truth for myself, and advise such help is their only chance at relief.

I will state for the record, quite contrary to DSM assertions, that about only about 1 in every 5 or 6 do suffer schizophrenia and are not truly targeted. I would then so advise, offering as many factual reasons as I hoped would be logically seen as true and valid to the client. Once in a while, they would see the truth, and act on it, but not often enough. A lesser number have been judged both schizophrenic and were also found to be targeted. The remainder were simply targeted, and merely seemed schizophrenic outwardly by third parties. They might additionally be seen as slowly being driven into a naturally resulting state of paranoiac behaviors. That is not the same as being mentally ill, certainly not the same as being schizophrenic; it is simply survival instincts gone overboard in an appropriate effort at self defense. That, I can work with on my own, and it takes no psychiatric skills, only logic.

The nature of the Elephant in the room

It is important to understand: Schizophrenia is not some shameful state of insanity such as people tend to think it. It is simply (rather overstated) a chemical imbalance in the brain which can often be addressed with drugs and good council. Yes, there are significant pitfalls in the treatment process; there is a level of quackery to the ‘science’ behind it, and that results in a hard path typically full of side effects from trying to find the right med and dose level. The patient becomes a Guinea Pig. When the ‘science’ can consider the varied physiology of individual patients and come up with the right med and dose the first time, THEN, and only then will it actually be science, IMO.

But there is a significant difference between privately seeking help and being forced into it by ‘the system.’ The latter can sometimes result in forced treatment to the point of creating a ‘cured’ human vegetable who cannot function on their own, essentially institutionalized for life. The former is considerably safer and far less likely to have an unhappy ending, the worst possible result being an unflattering written record and a period of unpleasant side effects which soon enough wear off. A good result, however, would be a written clean bill of mental health; a well deserved middle finger upraised to all who doubted.

abmToo, some care must be taken to insure that the meds do not lead to suicidal thoughts without care to prevent actualization; many psychotropic treatments do have such side effects upon withdrawal from use, some upon use. I know of this and other unpleasant side effects first hand, as I and several members of my family have been put on such medications, which are often used for more than mental issues.

Fortunately, there are ways to seek voluntary helps with reduced risks — but which are situation dependent and cannot therefore be well described, here. But schizophrenia can also be addressed with WILL POWER, though a rare eventuality. This is seen in the movie, A Beautiful Mind, a true story. In fact, watching it led me to develop an all new technique useful in reducing the actual effects of various targeting methods, including DEW. I’m talking about reduction of targeting effects, such as pain and manipulations of mood, alertness, and mental acuity.

They can even work with non targeting issues, such as pain reduction for toothaches, burns, Diabetes, and other cause, or even to help neutralize tinnitus (encouraging, but as yet no results against voice to skull). While simple in method, they are difficult to master; akin to trying to become a Jedi Knight in descriptive processes. But some can make them work usefully to one degree or another. This, too, is beyond the ability of this Post to well address. Anyone wanting to know more may email me at proparanoidgroup at gmail com and ask for the Jedi papers.

The good fight

I write of all this, today, because I just received an email from a Man in a distant country I had been working with for a while. He was quite adamant about his stalking, and elements of it certainly were beyond anything possible in reality. But he did have the will to brave the process of professional care and did brave the treatment trial and error, and was actually cured. He wrote to thank me and put my mind at ease, a kind consideration on his part. The transformation in his life was so significant that it was clearly evidenced in his writing style and commentary. His very personality and mental prowess was restored.

It was extremely gratifying to hear of his victory, and see him restored to a normalcy, even though I could take no credit. I wish I could get away with saying all TIs were schizophrenic, and that such treatment was the only solution (the official shrink view); it would have saved me decades of unhappy dialogs and less than perfect results. If it were true, and if victims would be willing to undergo treatment because there were no dangers in doing so, it would be a far more perfect World. But sadly, such a World view would be delusional: exactly as embraced by most professional psychiatrists, today.

I complimented him on his bravery for undertaking that hard road, and for enduring the clumsy treatment process which eventually leads to a cure, or eventually illustrates by lack of cure, that schizophrenia is not present. Getting a piece of paper from a Doctor that treatment had no effect is useful evidence to a TI. EITHER RESULT is a win win, even where actual targeting is present along with mental disorder. Where the victim can eliminate those things imagined, they can better focus on defense and attempts to prove those things which remain and are real. Perps will flee in the face of exposure. The trick is actually being in a position to confront them with that possibility, a matter which dealing only with reality can afford.

It cannot be done by struggling against imagined enemy tactics and methods, regardless of if imagined through chemical imbalance, or imagined due to deliberately fostered false clues. “A mind is a terrible thing to waste,” but that is exactly what mind control seeks to achieve. A TI must above all else, therefore, take any and ALL steps necessary to safe guard the health of their own mind. Free Will, the gift of God, is as precious as the gift of His Grace and of life, itself. These things are a TI’s best weapons of defense and offense. I have a whole chapter in my book on exactly how that is true; Religion and MC. This, too, is available as a free .pdf on request.

The right use of Free Will (righteousness = right use ness) might just include ‘willing’ one’s self to brave confrontation with that Elephant in the room. Clearly, it will involve other battles, as well. Never is it an easy path, and even where victories are gained, it is more often true than not, that total escape is not possible. Some break free, but all who properly resist can at least better their circumstances well enough that they can claim victory, and as a survivor, survive what targeting remains as more a nuisance than a life-long debilitating experience.

Is this not what someone with a physical handicap or long-term debilitating health issue must do, if to survive? Targeting is no different a thing, except that it is forced upon the TI by outside forces for evil cause, quite Satanic at its core. It is, therefore, a spiritual handicap, more than physical or mental, if rightly viewed; it is a war for the spirit and free will of the victim, that very gift from God. Therefore, God is indeed the best ally.

I hope this one example gives hope to those in dire need. That, too, would be a credit to the man who wrote me, a kind of legacy or testimony which hopefully leads others to dare to do the same. Just take care, if that includes you. The path is not easy to see, and there are brambles to each side which must be avoided. While I can no longer offer actual paid consulting services, I do remain available for guidance and providing answers to simple questions which do not involve significant situational analysis (proparanoidgroup at gmail com). I answer all inquiries in person.

Terrorist H. Michael Sweeney’s RAP Sheet


OK, it’s true. There are at least a half-dozen ways the government can ‘claim’ I’m a terrorist. YOU TOO, for that matter. But I have a Record of Arrest and Prosecution ‘sheet’ to illustrate one of the ways I am definitely a terrorist to someone, including people that think I’m merely a conspiracy theorist. I am not ‘mere,’ at anything I do…

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

 

What makes you a terrorist when you live in a Police State?

Simple answer: anything you do. There have been so many Constituion trampling Acts of Congress and Executive Orders, all so vaguely worded as to allow the broadest of interpretations, that it is almost just that easy for someone in government to label YOU (and certainly me) a terrorist. That can have very unfortunate consequences, depending on who labels you, why, and what they do about it. You can end up on the no fly list, or some kind of watch list, or even be vanished forever by Men in Black whisking you off in a black van.

One such example is, that being a conspiracy theorist automatically makes you a terrorist according to FBI. That’s bluntly stated, but true, as an article at Public Intelligence illustrates: “A flyer from a series created by the FBI and Department of Justice to promote suspicious activity reporting states that espousing conspiracy theories or anti-US rhetoric should be considered a potential indicator of terrorist activity. ” The flyer, linked in the article, specifically includes 9-11 Truthers (that’s about 1/3 of the U.S. population).

OK; I’m a conspiracy theorist, or if you prefer, a Conspiracy Terrorist. But I am no ordinary ‘theorist,’ because I have a R.A.P. sheet… a Record of Arrests and Prosecutions. And here it is, below the FBI Fellon ID Card (which shows that not even FBI always gets the right man)… but be sure to read the summary text before you wonder why I’m still walking around freely.

hmswanted

R.A.P. Sheet, H.Michael Sweeney

1976  Wire Tapping, 2 counts, charges dropped for insufficient evidence

1980  Embezzling, charges dropped after resignation from company

1983  Counterfeiting, Drug Smuggling, sentenced

1984  Wire Tapping, charges dropped for insufficient evidence

1985  Shoplifting, 4 counts, sentenced

1987  Fraud, Embezzling (pretending to be a Pastor), Bad Checks, charges dropped after restitution

1988  Wire Fraud, 3 counts, sentenced

1988  Smuggling, 2 counts (bioweapons, diamonds), sentenced

1990  Espionage, Interception of Electronic Communications, charges dropped by NSA intervention

1991  Bank Robbery, 4 counts, sentenced

1991  Wire Tapping, 4 counts, cold case due to flight to avoid prosecution

1992  Fraud, 3 counts, Witness Tampering, 3 counts, Withholding Evidence, 2 counts, Murder,

            cold case due to flight to avoid prosecution

1993  Breaking and Entering, 2 counts, Grand Theft, charges dropped after restitution

1994  Wire Tapping, cold case due to flight to avoid prosecution

1994  Attempted Murder, 12 counts, case turned over to Internal Affairs, and dropped

1996  Espionage, 3 counts, Violation of Civil Rights, cold case due to flight to avoid prosecution

1998  Wire Tapping, Stalking, cold case due to flight to avoid prosecution

1998  Grand Theft Auto, Operating Chop Shop, 3 counts, sentenced

1999  Possession of Controlled Substance with Intent to Sell, sentenced

2001  Bioterrorism, Attempted Assassination, investigation closed by DOJ intervention

2002  Terrorism, 4 counts, cold case due to flight to avoid prosecution

2004  Bioterrorism, case closed due to lack of evidence

2004  Cyberterrorism, Hacking (of CIA’s Web site), charges dropped in exchange for services rendered

2016  Armed Robbery, 2 counts, cold case due to flight to avoid prosecution

2016  Bank Robbery, cold case due to flight to avoid prosecution

 

Summary Judgement

By now, if you actually read the full list, you realize no one person could be guilty of all those crimes and still be walking free… and that there were crimes on the list immediately after incarceration, and no jail breaks to account for that. This is because these are not crimes that I committed, but crimes I have investigated and exposed, or helped expose and prosecute, often working with Police, FBI, SS, and CIA, sometimes working against rogue elements of those and other agencies, even spy agencies of other governments.

Left out of that list, are perhaps 200 Stalking, Wire Tapping, and Torture cases I’ve worked on as online consultant with victims of such affairs (I’ve had contact with 12,000 individuals in that kind of predicament). I left them out because it would have made the post unreadable, and that’s a shame… a disservice to the thousands of victims of this form of abuse of power and conspiratorial corruption of principalities and powers.

So I do not claim to be a mere terrorist, but to have stopped terrorism. But neither am I a mere conspiracy theorist, because many of the conspiracy theories I’ve investigated have put people in jail, or at least shut them down and forced them to run away. One Governor, possibly two, a National Guard General, an elected County Sheriff, two Police Chiefs, a Criminal Investigation Division Lt., a C.E.O. of an international software firm, and a host of lower law enforcement personnel have all vacated their posts (some being jailed) after I finished doing my thing. While I cannot claim every one of them retired or otherwise departed their posts because of me, as I was not allowed access to official internal documents, I’m fairly certain a good number of them grumbled my name under their breath on the way out the door.

All that said, I hope that you, dear reader, have come to understand that a conspiracy theorist is no different than any other standard investigative force of a more official nature. Except for two small things, we all try to fit the available evidence with the environ of facts to determine the truth. We both form hypothetical postulations as to suspect and motive, prove opportunity and method, and try each point of evidence against all others which might disprove the hypothesis (though as we see all too often, many criminal cases are happy to prosecute the innocent if they think they can make a strong enough case and hide the truth).

We both theorize up front. The first difference is that conspiracy theorists do not have the luxury of making an official determination, while the official investigators do. The second difference, and most important, is that we start with questions regarding failures in logic in the official findings and reports; we question government, which is not only the right, but the DUTY of every citizen, always. How else will you ever find a cover up? We know there have been all manner of cover ups exposed in media over the last few decades, and I remind you, you NEVER have a cover up UNLESS there is a conspiracy, because a cover up itself REQUIRES a conspiracy to execute it, and the affair being covered up is always so complex that it, too, MUST by default represent a conspiracy. Guaranteed.

OK, FBI, come and cuff me… unless I’m wearing a bomb like other terrorists,or have run off to Mexico to escape your ‘justice,’ in which case, just have a better day.

FCC to Kill Local Television as We Know It


Once more, we see the Federal Government usurping power in ways which both benefit the big corporations at the expense of personal freedoms and financial viability of citizens. This time, it’s the FCC, and not the BLM, and they want to eliminate any chance for you to watch local television without paying through the nose for it… and suffering de facto censorship.

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

FTC to Kill Local Television as We Know It

From infinite unknown.net on Obama approved NSA spying on Internet (click)

From infinite unknown.net on Obama approved NSA spying on Internet (click)

Tuesday last, a little heralded announcement by the FCC once more revealed how controlled mainstream media is. They, more than anyone, perhaps, should have been screaming the news from the rooftops, and complaining about it, as it affects EVERY major and secondary television station in every market across the country. The ramifications are so broad and sweeping as to threaten the very social fabric which defines us as a nation. In summary, the threats are as follows:

  1. Eliminates all local television service as we know it today, virtually ELIMINATING ALL OVER THE AIR BROADCASTS. No more ‘free TV.’
  2. All licenses by FCC currently in place are cancelled, and ‘up for sale,’ they want to raise 60 billion dollars which will be unaccountable funds off the FCC budget. This means they can be spent on any black project without any accounting.
  3. Major stations (e.g., your local ABC/NBC/CBS/FOX affiliates) will be paid many millions from the sale, far more than the stations are actually worth; hush money not to protest, we must presume.
  4. Secondary stations, including repeater stations or small unaffiliated stations in deep rural markets, and even possibly PBS, will be paid NOTHING, a virtual THEFT, and possibly, a loss of all public broadcasting systems!
  5. All will be sold to Cable and Web content providers, forcing consumers to get any TV by paid subscription or on-demand purchase.
  6. Significantly eliminates local news coverage, limiting it to official sources only; the government’s preferred message, a form of censorship which effects de facto mind control.
  7. Stages the FCC for total control of Web content under the new ‘authority’ it declared for itself last year; easier to censor and dictate what you can learn if there is only ONE resource and it is controlled by government.

 

from International Liberty's page on foibles of FCC's 'Net Neutrality' (click)

from International Liberty’s page on foibles of FCC’s ‘Net Neutrality’ (click)

It follows the Fascist model: The plan is insidious beyond belief once fully understood. It is perhaps no coincidence whatsoever that it follows Obamacare. If one reviews history of the quiet takeover of nations by Fascists and other dictatorships, those ‘bloodless revolutions’ always start with the complete takeover by government of all health care, followed next by takeover of all media. What follows is usually great financial and social upheaval allowing significant draconian responses, to include something along the lines of Hitler’s Brownshirts and the SS, and a permanent war footing with an expanded military and military police state. But people never learn by the mistakes of history, and there is plenty of that…

It happened that way in Germany, Italy, and in South America, it happened again and again. In each and every case, the takeover steps were quietly initiated and never fully understood even by those involved in enacting the changes. In every case, they inflicted greater hardships socially and financially upon citizens than those woes they claimed would be addressed thereby. In each case, a central power figure emerged who responded with ‘law and order’ and bypassed, neutered, or altered the form of government to a Fascist regime.

Unfortunately, any and all of the current Presidential candidates, save one, could fit that bill in this author’s opinion. Trump appears to be a closet fascist, Cruz appears to be one of the same old gang of criminals who brought us to this point in the first place, Bernie is a closet Communist, and that awful woman is simply a criminal rapist of nations and peoples. But my opinions are unimportant. Even if whomever is elected is not set to be a fomenter of fascist revolution, the power elite who manipulate politics will simply assassinate them or blackmail them to assure the desired outcome.

Naturally, like most draconian moves by government, the official propaganda is worded exactly the opposite in tone to the reality. That’s why we get Bills that actually accomplish the reverse of their title, like ‘Affordable’ Health Care Act. Believe as we say we do, and ignore what we actually do.

Take a look at FCC’s official page, here.

Now, lest you think me simply another lunatic conspiracy theorist, I got my first wind of this plot, to include all points cited herein (save my opinion on SOME of the candidates), from a conservative call-in radio show where the station owner of a secondary market called in to shout a warning and explain exactly how it was rape and pillage of the television industry and the public in favor of Cable and Web bigwigs. I don’t make anything up; I don’t have the time nor inclination!

 

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View


The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some Satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that select shooting lines form a 3-D perspective view of Cheaps and transparent depiction of all inner passages;
•  that there are specific ties between Cheops and the goal of the New World Order;
• that Cheops is a kind of key to understanding European Illuminati/Templar relationships to mass shootings.

Are mass shootings by intelligent design?

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View

Is there a mass shooting conspiracy?

Mysteries of Cheops

In the prior post we saw ties between shooting event lines which formed Masonic and Satanic symbols, and a series of orange lines which led us to the Great Pyramid, Cheops, in Egypt. While those were quite remarkable and sufficiently consistent to defy any chance of random coincidence, what follows will dramatically make concrete the notion of intelligent design as well as the importance of Cheops to said design. And finally, we will see there is yet another way to look at Cheops’ roll in the Illuminati/Templar and mass shooting tie-ins, but this time, from the European point of view.

First, we need to understand a bit about Cheops and its importance in mysticism. There is so much which could be said that there are literally countless books on topic which could be entered as ‘evidence.’ Here, I will focus on less than five percent of such material topically, only able to skim the surface of them. Consider it merely to whet your appetite to learn more, for which some suggested links will be provided along the way.

One key aspect of Cheops is that it is rich with magic numbers. This seems to be true regardless of if using the original units of measure employed by ancient Egyptians, or modern day equivalents. Indeed, some of our current units of measure stem directly from the ancient Egyptian measuring system, a fact often laid at the feet of Freemasons and their predecessors, the Masons. While I won’t spend time expounding, many of the measurements of Cheops, both in original and modern increments, enjoy magic number properties, doing so in ways which, like those illustrated in the prior post, are mind boggling. Some serious mathematicians have found even more wondrous relationships to both the ancient and modern discoveries of Man well beyond any possible knowledge to Egyptians of old.

Perhaps the keymost aspect of Cheops which potentially makes it ideal for inclusion in mass shooting patterns is that it is only the Giza Pyramid which has a complex of inner passageways and rooms. Early mystics and even some studies of Cheops by persons with scientific credentials and methods, have proposed and illustrated a belief that the construction of Cheops was an enlightened project involving supernatural or mystical knowledge of the future; the internal passages and chambers thought to be a roadmap to End Times and key events along the way. That is represented by the image, below, from this interesting Web site. Others out there (with less useful images) have more detail with the most recent/current annotation being the year 2010, roughly the height of mass shootings. That marking is in the King’s Chamber, which implies ‘control and authority.’

ONE Egyptian Inch = 1 Year of History. From gizapyramid.com (click).

Of specific interest to mass shooting research and the notion of Illuminati Masonic Warlocks being the architects, thereof, is the fact that shooting lines can be found which quite correctly depict a pyramid across thousands of miles of the United States. More than this, they quite usefully do so in 3-D rendition, even to the point of detailing the inner passageways found in Cheops. In fact, the depiction is so uncanny as to have key aspects ‘to scale’ with measurements which work math magic using modern increments of measure against the ancient’s units of measure; not just scale in size, but across the barriers of time in the expression of numbers in different languages and cultures. Take a look:

 Do the pyramids really relate the entire history of the World from beginning to end?

Shootings depict Cheops

Pyramid

Left: perspective transparent view; Right: inner view of interior passages. Remarkably, it took only 9 shooting lines, and 14 shootings, to depict the pyramid and passages. However, 5 shootings stand alone (not on lines), meaning 9 are, giving us again the magical 99/18 result.

As you may recall from the prior proof the orange lines are lines which run from shootings directly to the Great Pyramid, Cheops, each exactly 500 miles apart as measured along a given line which is perpendicular to them all, and which itself runs through several shootings. The green line here, however, is at the distance of 10,000 miles from Cheops, which is one/fourth the distance around the World (the vertical diameter being 40,008 miles on average), and it too transverses several shootings and is perpendicular, but the distance at this point between lines is 505 miles.  Each orang line originates dead center of Cheops and is separated by almost exactly 7.5 degrees of arc to achieve this feat. That is interesting for another reason; 360 degrees divides by 7.5 exactly 48 times, and 24,000 miles (the rough diameter of the Earth horizontally), divided by 48 indeed equals 500 miles.

Now there are some admitted problems in trying to depict a pyramid with any degree of accuracy in a 3-D perspective view, especially if with cutaway to reveal interior passages. Such a view does not simply allow us to measure a line and compare it to Cheops with good expectation of results. Perspective causes a measured horizontal to be less as it is depicted further away. A line transiting diagonally in one or more axis in 3-D space is even less useful unless one knew the precise angles for each axis both it and the original against which it was to be compared, were employing (and additionally, the depiction version is arbitrarily decided by the person rendering it, and impossible to discern without their sharing).

Cheops!

As the satellite view is at a an angle, the ‘center’ is based on the base, not the peak.

The depiction in this case seems slanted over America as if about to slide into the Caribbean. That is for a reason: it is faced (viewed) with the same face (view) as the actual Cheops is when following the orange lines, there  — presuming in both cases one is looking from the center orange line towards it. That is to say, looking at Cheops in America from the center of the lines, would give you this same perspective view if standing in the center in Egypt. That cannot be coincidence.  The problem with that, however, is that in Egypt, in relation to the Orange lines, one corner is clearly (looking down from Google Earth) nearer the observer’s position than another; there is no line which is not at an angle to the observer.

Note: I further feel it is an error to assume that modern-day Illuminati Warlocks have the skills and knowledge base, or event he interest in the crafts and mathematics of Masonry, which they left to the Adepts when Templer remnants infiltrated the Mason’s Guild and eventually took it over to form Freemasons. They are not likely going to go for precise renderings as much as symbolism; accurate to the point which can be managed simply, but no more, I believe.

 Why do Masons, the Illuminati, and Satanists focus on Egypt and Cheops?

How much is a Royal Cubit, anyway?

It is, as result, impossible to establish a precise method or true consistency in relationships (i.e., to test for accuracy in scale) of measurements between Cheops and the American pyramid. The required data and accuracy required to plug into complex formula is beyond our ability to deduce. Ideally, a computer program modling in true 3-D space could be used to compute and confirm such comparisons… if we knew the angles employed by the architect of the American depiction.

But that does not mean we give up. We do the best we can with the tools at hand, and must come away at the very least acknowledging that in the 3-D layout, the mere visual similarities alone are sufficiently ‘coincidental’ to imply intelligent design, and in need of further study with better tools. But that does not mean we cannot ‘cheat,’ and then test to see if our cheat had any merit. After all, perhaps the architects employed a similar gambit. We wont’ know unless we try, ourselves. So…

By rotating the view as I have in the image above, we at least have the illusion that the base line is perpendicular to our viewing angle such that we are tempted to measure it anyway, and then see if there is any discerned relationship to Cheops which results in some kind of conversion factor. If we CAN find one, we can then apply that factor against other test lines and, in theory, if or factor was arrived at by other than coincidental happenstance, we should find the measurements work out correctly in the conversion. Guess what? We can, and it does!

Cheops on a side is 440 Royal Cubits, or 36524 Egyptian inches (a precise year’s worth of inches times 100), which works out to 230.4 m, or 756 feet. I will admit that finding a conversion factor took me some time. I made no headway at all until I realized that the orange lines were like rays of a projection lens in a theater, taking a small image and projecting it to be much larger at a distance. I reasoned there had to be something about analogy involved in the conversion factor.  I also felt that any such conversion MUST involve the ancient increments in some conversion to the modern, rather than a modern to modern comparison. Turned out true.

As I discovered, if you divide 36524 by 440 you find that there are 83.009 Egyptian inches in a Royal Cubit. Funny. Both sum to 20. If you then multiply this times the total degrees of arc for the American depiction, which is three orange lines, or 22.5 degrees (±.03), you end up with 1867.7, which is exactly the measurement of the depicted base line… in Kilometers; ancient to modern, using the orange lines as calculator. So, now to test the accuracy and intent, vs. the notion of coincidence (pretty big coincidence, if that is all it is.)

Testing our factor: There are only a couple of other places where lines are similarly ‘perpendicular’ to our view (like the base line) by our peculiar method of so assessing for the purpose. Two of these are passageways to the King and Queens chambers, which just happen to have shootings (house icons employed for this use to match the drawings of the actual Cheops chambers) at the approprate locations to at least approximate the inner passages with an appropriate resemblance. But there is a problem with trying to test these with our conversion factor. It has to do with the Mississippi River.

Looking at the drawing of Cheops’ interior, you will note there is an irregular passageway leading down between the upward and the downward sloping passages. This is thought by some to be a water drain, as there are interior air vents which happen to align with prominent Constellation stars on select key celestial event dates, and that admits water. The lower passage in fact has a chamber with a deep pit which resembles a Well. In America, as it happens, the Mississipi River runs a course reasonably similar to that passageway and at the appropriate points in our depiction, given some small fudge factor.

Clearly, the Illuminati has no control over the course of the Mississipi, which changes slowly with time, and therefor, any depiction of the inner passageways must in some way accommodate those changes. My conclusion is, therefore, that such accommodation would necessarily mean a skewing of measurement accuracy in these passageways. Indeed, no line among them which is angled, nor the passages to the King/Queen chambers, quite works out, though some come closer to doing so than others.

But there is an entirely different story in play once we get past that drainage passageway, at the very bottom of the network. That whole portion is, by the way, beneath the ground level of Cheops by a goodly distance. In fact, the pit, which was filled with loose rocks as if a French Drain, once cleared, measures 60 feet deeper.  Now, there are three points of interest with respect to testing our measures, and some landmark verifications we can also apply…

These are: the entrance passage to the Subterranean Chamber; an exit passage which is a dead end; and the pit. Applying our conversion faster, all three lines as depicted are of the correct length and are at the correct scale to the previously computed base line. But there was no shooting or key line to establish these lines (well, one line seems to do so), so we must seek some other verification that these are as intended by design. They do exist. Lets take a look:

SubPass

The entrance passageway: The entrance passage determines the location of the Subterranean Chamber in the depiction, which we will verify separately. But it also has an unusual feature along its walkway, a kind of antichamber or alcove to one side, with no discernible purpose. On the map, at its correct location in the depiction, we find our old friend, Remington Firearms (the white arrow). That was, in fact, one reason I tested line placement at this site. Interesting then, that both this Proof and the prior Proof find their factories involved in shooting lines, baphomet lines, orange lines, and pyramid lines. That cannot be coincidence, and points to intelligent design, and intent — especially since the other Remington facility from the prior Proof is also present directly along another passageway, as seen in the first image of the depiction from above.

The exit passage and pit, on the otherhand, when extended the correct distance within ONE METER accuracy, end at… water wells, pumps, and tanks; which relate well to the purpose of the Subterranean level. That leaves the Chamber, itself. You will note a graphic image overlay veils in transparent fashion the intersect between the two measured passages and the pit. While there to represent the chamber, it is not really as ‘large’ as the chamber would be if to scale. At a particular location within the Chamber area it does cover, we find a nuclear power plant. This is interesting because much lore about Cheops includes references to end times, and equates the Subterranean Chamber to Hell, and the bottomless pit. One of hottest things we have on Earth is the interior of a thermonuclear power plant, and it burns both with heat, and invisible radiation; hell on Earth, should you care to experience it, with or without an accompanying China Syndrome ‘pit’. But there is an even more interesting verification, which is why the overlay:

Chamber

It is hoped that it is not intended that this nuclear facility suffer a China Syndrome disaster such as seen at Fukushima, in order to render the ‘pit’ real on Earth in a hellish fashion.

The inset is the original artwork from which the overlay was obtained, a sketch of the what the actual Chamber looks like at Cheops, where it is described as seeming more like an underground quarry with lack of intent in what remains. The original is of very low resolution, I’m sorry to say. What I noticed about it that caused me to think to do the overlay, was the leftmost vertical protusion. I’m glad I did, because when I overlaid it, seeking to line it up with the cooling tower of the nuclear plant, I noticed something.

Actually, I noticed it while playing with the transparency level so I could see where I was positioning it. I truly wish I had video capture ability to show you the startling discovery, which, with a slight change in aspect ratio, was maximized; the darket portions of the overlay precisely match and seemingly define changes in terrain or map features. The effect is this: it gives the impression that the terrain to the South and near the power plaint has been cultivated to MATCH the overlay usefully. The best that I could hope to do to depict it here was to increase the contrast of the overlay, and alter the levels. There were originally only two discernable shades, black and gray (it is a B/W original image with some dithering in evidence). There are now four, and only the lightest of these is NOT defining a shape or darker area on the Map.

I apologize in realization that this is nowhere near as useful a description as the visible effect I’d rather show with video, but I assure you it is startling and implies, along with the wells and the Remington matter, that these lines are indeed intended to be here and at these dimensions, which in turn verifies the scale conversion factor discovered. Intention by design, in design.

 What is the the relationship of Cheops and Mass shootings to Templars and the Illuminati?

The European point of view

EuroAt right is an image looking from Cheops towards Europe, to reveal how it ties in with the Illuminati and Templars of old… not to mention any modern day Illuminati Warlocks operating there, today. Especially if their operations include casting magical designs in mass shooting in America to fast forward the formation of the North American Union and establishment of a one-World government under control of the Antichrist. Observe:

At the bottom we have our orange lines radiating outward at increments of 7.5 degrees of arc, where, in order to get to their designated array of shooting destinations in America, they must first pass through Europe. In Europe, we find one of these lines passes directly through the birthplace of Adam Weishaupt, Masonic founder of the ancient Illuminati (ironically, in 1776 — not truly ancient as most count it).

It is interesting to note that one can create in Europe, using only the birthplace of Weishaupt, and the orange lines, a baphomet which is correctly aligned Northward (the stray orange line), IF, and ONLY IF, running the North-line through the VATICAN IN ROME at the adjacent orange Cheops line. Then, IF, and ONLY IF, electing to use the Weishaupt’s birthplace as the center of said baphomet, will it then result as seen.

The significance of that is manifold. For one, it rests upon the remainder of the orange lines in precisely a mirrored orientation and in like relationships, in general, with the orange lines as does one of the baphomets in America. In other words, just as the depiction of Cheops in America was at the same viewing angle relationship as if looking at the real Cheops from an orange line, so it is, here, with the two baphomets.

Thus once more, the orange lines ‘project’ an image in useful scale with the same orientation to create a sister depiction in America. The difference is, THIS ONE, is properly aligned North for ceremonial use, and the one in America is flipped, so to speak… which allows IT, TOO, to be aligned with North IN AMERICA. How can that be by anything, but design?

Weishaupt’s baphomet, by the way, is at a point along the orange Cheops lines where, if used as a measuring point, they are exactly 333 Km apart, which is 207 miles (sums to 9), and 180 nautical (18), and since 18 = 99, that makes 3 threes and 3 9s, which is 999, or a code number for 666. And, of course, if electing to measure in both directions (the diameter of a circle about the birthplace between two adjacent orange lines), we also get 666.

Finally, we also see in the image the yellow icons for Templar castles and other properties, at least the ones we know about, and the red icons (and one balloon icon) which are Illuminati historical sites. We see also one green and one purple line coming from America, one a guideline from a baphomet depicted, there, and the other from a Masonic emblem, there… where both additionaly go directly to Cheops. The circle is complete; Cheops, European Illuminati and Masonic (Templar) histories (and arguably, current Warlock activities), and shootings in America and their resulting patters, all neatly tied together by six lines which impact all else. Coincidence?

 What is the link between Masons, the Illuminati, Satanism, the New World Order, and Egyptology?

Go back to Introduction

Go back to Proof SevenShootings Form Multiple Lines to Cheops Exactly 500 Miles Apart

Go to Proof NineShooting Sets Share ‘Magical’ Data Points Which Decode to Messages

Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart


Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that select shooting lines can be extended to a single spot on the other side of the World;
•  that spot is the Great Pyramid, Cheops;
•  that the lines are exactly 500 miles apart at a given point and form the same angle of arc.

Are mass shootings by intelligent design?

Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart

Is there a mass shooting conspiracy?

The last proof resulted in some negative commentaries to group posts announcing its availability, all based on disbelief in the postulations advanced. This requires me to repeat myself: It does not matter what you or I believe, it only matters what the architects of mass shootings believe. Now, in this post, we start to examine the symbolism of Cheops and its ties to the shootings, which is also about what THEY believe. But first, I owe readers of Proof Six an explanation about the relevance of the ‘orange lines’ to select purple lines of the satanic baphomets and green lines of the Masonic emblems discussed as tying directly tie to Proof Seven in an unusual manner. So here we go, referencing the image below…

The orange lines are the multiple lines to Cheops this post is all about, of course, but those lines by and large pass through Europe using what is known as the Polar Route on their way to Egypt; the shortest, most direct route, despite the fact that in the movies they always depict planes flying East over the Atlantic to get to either Europe or the Middle East, or the other way ’round if going to the U.S. This is why, for instance, Iran Contra gun running used a stopover in Denmark and other Euro sites on their way to Iran, something which at first didn’t make sense to me when I learned of it.

The purple and green guidelines used in finding and plotting the baphomets and emblems also go to Europe, and end up doing something the bulk of the orange lines ALSO do: they just happen by ‘coincidence’ to pass through at least one, but more often, MULTIPLE ancient Illuminati and Knights Templar castles and other properties employed in their conspiratorial affairs, including some more modern facilities, and even Adam Weishaupt’s birthplace. He, of course, was the founder of the Illuminati, and a high Mason, and the Templars were the folks who evolved eventually to become the Freemasons we have today, as outlined in my book, MC Realities. There is one other line which does this, which is a red line created from a perfect isosceles triangle from Proof Three, which is the best example of ties to the modern Illuminati, as well as ancient, but also Cheops as it also directly intersects with the famous glass pyramid at the Louvre Museum in Paris.

There are other indications these lines and their relationships with Illuminati and Templars is tied to Cheops, in that some of the lines continue past Europe to the Middle East to find Templar sites, there, and two others, one each from a baphomet and an emblem, go directly to Cheops as if an orange line. It is interesting to note further, that these two are extremely close to the second orange line in from either side of the six orange lines; uniformity. Take a look: each white arrow indicates a line of interest which ties to the Templars or Illuminati. The ‘houses’ represent Templar locations (those icons refuse to float accurately over their respective sites at this viewing altitude), and the harder to see red dots are Illuminati, save Weishaupt’s birthplace, which is well marked. There are 18 lines in all, our magic number which equates to 666 in occult terms, only one of which (orange) does not find a Templar or Illuminati site, but we are talking about locations which in many cases have been lost through the centuries and, likely, it really does do so, but we simply have no such knowledge, today. The modern day Illuminati, however, WOULD know. The line certainly passes through territories where such properties are otherwise existent (not all sites are shown, only those which are intersected by lines).

pastpaths

Cheops I had previously been aware of the importance of Cheops to Masonic and Satanic histories, some more tenuous or doubtful than others, but all generally of a mutually supportive nature. If one reads the Masonic Bible, Morals and Dogma, it is clear that the leadership of the organization at the higher levels, is Satanic in its beliefs, practices, and tactical applications, and that all things of Ancient Egyptian lore play into their belief structures and lore. To Masons, especially, there is significance in the Pyramid, and thereby, also to Satanism.

Yet one can find other resources which state the Pyramid is outright tied to Satanism in one way or another, both inclusive and exclusive of Masonic ties, which came later in history. It is a Chicken or Egg question, or sorts, depending on the factoid being considered, but we need not answer those questions; our concerns are valid regardless of the answer. So when I noticed that some shooting lines seemed to angle off toward what I knew to be the ‘polar route’ to Egypt. I sought to verify, and was immediately proven correct. In the image above, find six orange lines which all meet precisely at the peak of Cheops a third-way around the World. They are all drawn at the same degree of angular separation (about 7.5 degrees).

At a given point in the map, in America, they are all exactly 500 miles apart, and as this image shows, they relate to shootings as they go. To date, only one (left most) has no useful shooting along its path to make the claim, but that does not mean there will not be in the future, and so, it is included. It may prove a means of predicting and even preventing a shooting. CHEOPS ALIGNMENTS x 6 There is no significance in the 500 number — at any given point, the lines are equidistant by some measure, I just chose a point where it produced a round number.

However, as research continued, I learned some things which would seem to make that a more important point. In the image below, this is revealed, and in the doing, we see also how the shootings themselves tie to the lines in important ways. More than this, the actual measurements once more reveal magical use of numbers in the occult manner. We should talk about accuracy. Given the great distance these lines must travel (35 million feet or more), the worst accuracy of these key lines is typically less than .05 degrees of arc (dependent upon Google Earth limitations as discussed early in this posting series), or some 15,000 feet at measure point. These work out to a maximum error of .007% and .0004%, respectively. I’m good enough with that to cite it here as proof of intent, given that the architects of mass shootings likely used the same tools, as I. There has, after all, already been revealed in prior Proofs several clues that such is likely the case.

cheopsUSA

Here we see some 440 plus mass shootings plotted along with the six orange lines from Cheops. The three green and three red lines are for measurement purposes, and require some dialog in order to appreciate the ‘craftmanship’ employed by the architects; a kind of confirmation this is no random outcome. The Meridianal (vertical) circumference of the Earth varies depending on where measured, but the average is 40,008 Km. This means that the point where the orange lines are furthest apart is some 10,000 Km distant from Cheops. This spot is found at the middle green line, and the measure there is essentially 2,525 miles.

This is confirmed in the red line between adjacent orange lines which measures 505 miles.  The other two lines are the points where 500 miles between, is found, for 2,500 miles total separation, there. EACH OF THE THREE HAS AT LEAST THREE SHOOTINGS ALONG ITS PATH. These numbers prove interesting, and thus I also elected to measure the diagonal (vertical red) and ‘hight’ (red along the orange line’s path) of a given rectangle formed by these lines. The vertical line, which happens to be North corrected for magnetic declination, a trait seen time and again in the various alignments of Satanic and Masonic symbols in the prior Proof, measures 777, a magical triplet. The height measures 606 miles. More interesting numbers.

Take a look (numbers are rounded unless otherwise stated, and reflect allowances for measurement errors introduced by Google Earth as previously mentioned): Note: you may wish to review the sidebar post on Magic Numbers before continuing. Because… 500 Miles = a palindromic 434 nautical, which sums in pairs to 77; 777 is not only a magical triplet, but forms by summing in twos (1414) the inverse palindromes 141 and 414, which sum together to form the triplet 555, and equals 675 nautical, which sums to 18, and 1250.46 Km, which sums to 18 by threes; 505 and 606 are both palindromes, of course. And about 2525, divide it by 505, and it goes exactly 5 times. 505 + 606 = the double doublet 1111 (a quad) 500 x 505 = 252500, which sums to the doublet 77; 500 x 606 = 303000, a palindrome times 1,000; 505 x 606 = 306030, a palindrome times 10 which sums in threes to 99, which is a code number for 666 just as is 18; 306030 also = 492508 Km, which sums to form the inverse palindromes 151 and 515; and 606 x 777 = 470862 which is divisible by 18 2,159 times, and the grandaddy 666, 707 times.

So we end up with 505, 606, and 707 palindromes, and the triplets 555, 666, and 777. 505 squared = 255025, which sums by twos to the palindrome 757; 606 squared  = 367236, which sums to the the triplet 999, a code number for 666 (upside down); it also divides by 18 to provide the palindrome 20402; 777 squared = 603729, which can produce 999 by summing by 3, 2, 1 digits consecutively, a bit unusual; We can’t easily find the area by simply multiplying 606 x the top or bottom, because they are different. We can do that with both and then average the result. This yields 303000, a palindrome times 1000, and 306030, a palindrome x 10. The total of the two  sums to 609360, sums to the palindrome 6116, and which divided by two = 304680. So now we know the area, which is 1680 sq. miles more than the smaller of the two, and that much less than the larger, of course. 1680 = 2704 Km, which not only sums to 13, but is divisible by 13 208 times.

The orange lines in detail

In the last Proof, we found the orange lines tied usefully to the layout of the four baphomets and Masonic emblems. Here, lets relate them more directly to the actual shootings which were also part and parcel of those relationships. The first lines at image left does NOT actually line up with anything, YET. It is presumed they will eventually line up with a shooting and may be useful in prediction of same, as there are very few communities in its path with logical targets which fit with other predictive factors. But I will not state these as our paranoid government tends to make anyone predicting such violence based on ANY criteria as the only ‘terrorist’ or ‘suspect’  in question. They tend to lock down such locations and charge the person who gave the warning with criminal intent of one sort or another, or act harshly against them in some way. Apparently, ‘See Something, Say Something,’ is a trap, and considered a crime. I know that at least twice that I reported terrorist activities, they did nothing about the report other than to harass me and try to cost me my job.

The next line is perhaps the most dramatic in terms of accuracy and alignment. It bisects with extreme accuracy two shooting events, even a third within Google Earth dictated error limits. The third also has three shootings within accuracy limits, two of which almost meet doorway-to-doorway accuracy.That line also passes through the Denver International Airport and quite near to a man-made earthen Ziggurat (stepped) Pyramid thought by many conspiracy theorists to be a D.U.M.B. (Deep Underground Military Base). The site claims to be a landfill, albeit the highest and fastest growing of its kind by far, if true.

It is also true that in its current state, it only appears to be a Pyramid in three of the four sides, the fourth being the area where ‘fill’ is taking place at this time. The next line features the sloppiest, worst-case error with two shooting points in its path. The larger error does not dissuade me, because both are quite equally distant from the line on opposite sides of the line (the line cleanly centers between them). There is additionally a business, Pyramid Foods, almost directly on the line near the Bartlesville HS shooting plot of that line. The next line also sports two shootings, one of which is quite near Meridian, MS; Cheops is itself a similar distance from Meridian, Egypt (a neighborhood name also used in several business names, there). The final Cheops line merely intersects within 1,000 feet of a single shooting event. This is near King’s Highway, and Cheops is a King’s tomb. Thus all the lines currently aligned with shooting points, are several are also aligned with something having to do with a Pyramid. This yields yet more consistency, but feel free to presume it coincidence, if you must. What does Cheops have to do with mass shootings?

Why Pyramid?

Beyond the earlier comments about why Cheops is important to Masons and Satan worshipers, there are a few other things which should be mentioned. One has to do with the construction of the Pyramid, which many historians think drove the establishment of at least some of the ancient Egyptian’s measurement system. What is interesting about that, as casually mentioned earlier in this series, is that as history progressed, their system became in various ways the bases for both the English and Metric systems, as well as the system employed in America. It is alleged that Masons (Templars) were the driving force behind this, in part, to insure or play to the mysteries of magic numbers.

One of the few 3-D cutaway views on the Web from ancient-egypt.org (click)

So do not be surprised then, if the next post, I tell you that there is not at least one measurement at Cheops which is duplicated in shooting lines here in America which depict the same part of a pyramid in a 3-D view, but using different increments and a different scale (think miles for inches, for example). I’m still working on verification of a list of suspect instances, but it certainly seems the case. This would NOT be possible if there was not some basic underlying ‘magic’ built into both measuring systems with respect to conversions. But the real thing of interest about Cheops, here, is its lore.

Many learned researchers have studied the Pyramids endlessly to formulate many different theories relating to its design, how it was constructed, what its purpose was, and so forth. Many of their findings are controversial, but few are invalidated by the work of others, but might remain rightly in the realm of speculation, or ‘lore.’ Among these are two which would logically be of interest to a Warlock or high Mason (sometimes, the same thing).

The first involves the inner passageways of Cheops. We know these are important to the architects of shootings because, as we will see in the next Proof, they are faithfully duplicated in the 3-D depiction of Cheops by use of shooting lines and shootings. The reason why would seem to be in the lore, which according to some, says that these passages are a kind of history of the World being depicted from creation to its destruction. They actually make a very good case for this, and my own conclusions would tend to agree there is something to the notion, at least symbolically, if not accurately to the year. The claim was, that each Egyptian inch represented one year of history, a thing which seems to be true at least for specific historical events used as benchmarks.

If, therefore, the need to seat the Antichrist in support of end time prophesies requires taking away guns in America to allow the formation of the North American Union, then our architects, being wise in the magic and lore of Cheops and the like, would most likely incorporate as much of that magic into their plans as they could manage. The second involves what is called Pyramid Power in a book by the same name written by Max Toth, which is as good a reference as any of like conent summarizing the lore of Cheops, including the inches for years theory. If even half of the claims within were true (and I have verified at least two of the main claims in my own experiments), that is one more reason a Warlock would wish to incorporate pyramids into any conspiracy aimed at seating the Antichrist. But again let me say, it does not matter what you or I believe about such lore, it only matters what THEY believe.

Go back to Introduction

Go back to Proof SixShootings Also Relate or Depict Masonic and Satanic symbols

Go to Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View

Crime Series: Ten Unexpected Proofs ‘Random’ Mass Shootings are by Intelligent Design


Ten easy-to-grasp but remarkable proofs, both visible and hidden: Illuminati style mystical symbolism and related ancient magical mysteries, calling cards, bragging rights, and Warlock spells cast against America, and the World. Conventional clues, too.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this multi-part posting series…

•  there are 10 interlocking proofs that mass shootings are not random;
•  they include various kinds of patterns, visible and unseen, and even coded information;
•  that the pattern predicts itself, and understanding may therefore help stop the murder;
•  that the codes and clues seem to be like signatures identifying the architects.

Are mass shootings by intelligent design?

Introduction: Ten Proofs ‘Random’ Mass Shootings by Intelligent Design

Is there a mass shooting conspiracy?

Note: This series is not yet ready for full presentation, but the most recent Fort Hood forces me to start releasing the material without delay. The reason for delay has had to do with an inability to provide high quality graphics suitable for proofs. This will be overcome, shortly, I hope.

One thing you need to know about me as an investigative writer or, as media and government would prefer you to think of me, a ‘conspiracy theorist,’ is this: whenever I decide to take a close look at a potential conspiracy or lesser matter, I do it right. If I cannot uncover something no one else has brought to light, I’m either not finished, or I’ve backed out concluding it beyond reach, or a dud. If you read my findings on a given research, you will undoubtedly learn something FACTUAL no one else had previously discovered or brought to light. And so…

In this matter, we find the shear volume of startling new information overshadows and renders original headlines and competing theories essentially meaningless — especially media’s version. It will make you angry. It will scare you. The question is, will it motivate you to do something about it? YOU are what you are waiting for, you know.

But in introduction, there is still one other point which must be made; it is in form of a problematic question. Can I get you, the reader, to override your current belief structures long enough to  consider the unusual nature of the findings? This presentation will most assuredly fly in the face of what most people consider ‘traditional wisdom,’ but it also will explain why it is non-the-less valid. Can you handle the Truth, or will you wimp out to the comfort zone of current beliefs?

Area all mass shooters psycho?

On suspending belief structures

mythbust

Dormer was not quite a ‘Mass Shooter’ incident, at least not at a single location/time. But the affair highlights the problem of accepting ‘random’ as the right word to apply to shootings when there are so many problems with the official story. CLICK to learn about why many people think him just another shooting patsy.

I began a ten-year research project for a book, Fatal Rebirth, in late 1989, which also begat a screenplay published on line in 1999 (The Electronic Apocalypse). In the book’s Introduction I urged the reader to suspend their belief structures briefly and read the material as if merely fiction for entertainment’s sake, because many of the concepts within were so new and unusual as to defy belief — likely seen as ‘far-fetched’ by most uninformed readers. I offered over 1,500 footnotes and a huge Appendix section to help them consider why I deemed them factual.

This blog post should be read in like manner, especially if you are content with government’s actions, are a politician, member of a government agency, military, or any part of the justice system, or Media. Especially if you are involved in a mass shooting incident as a professional or a victim seeking to know the truth. And even more so if you are gun owner, or even among what 2nd Amendment supporters refer to as a ‘gun grabber.’ I plead, therefore, that you suspend your belief structures briefly as if reading a political/horror-science fiction piece.  That’s what it is, actually, minus the fiction component.

You will, like readers of Fatal Rebirth, I would hope, realize the truth by the time you reach the end. Or, at the very least, you will be entertained for all your reluctance to let the message sink in and take root.

If nothing else, even if you choose to doubt some of the more obscure subtopics (i.e., relating to mysticism) have any factual basis in REALITY, consider this: it matters NOT what YOU think, given they ARE taken as real by persons likely to be behind any such conspiracy (i.e., ‘Illuminati’ Satanists). You MUST also ask yourself, “Can the sheer magnitude of interlocking clues be ignored?” Because at every turn they defy the odds of coincidental probability, as illustrated by carefully crafted control study groups. If thinking logically, you MUST concur that intelligent design is revealed despite what you may think about the logic of the beliefs which lay behind it, or the unusual way in which the evidence was revealed.

Pending you conclusion, by all means feel free to think me mad if you must. Read just for fun, but please read it through to end before you render final judgment as to if madness or truth be present. A logical reader will be converted unless their mind is already so firmly made up that they do not wish to be confused by facts which destroy their belief structures. Judge not what ye know not, but that upon which ye are well informed and have considered fully, judge freely.

Your future and the future of your children could well be at stake, a statement applying to all mankind. Why do I say this? The book mentioned above, Fatal Rebirth, was based on trying to illustrate what I call the Unified Conspiracy Theory; the notion that all of America’s darkest bumps in the night for the last half of the prior Century, forward, were not random oddities by random people for random agenda, but carefully orchestrated by the same core group of people with but one goal for the World in mind.

I termed them Shadow, but they are also known by other names; the New World Order, the Illuminati, the Power Elite, Globalists, and among them, member names like CIA, Skull and Bones, Bilderbergers, Council on Foreign Relations, and many more of like nature. Their goal I termed End Game; the establishment of a One World government, a single seat of power in order to seat the Antichrist upon his throne and bring us to Armageddon.

The Unified Conspiracy Theory, once justified in research and taking shape in book form, led me to realize that their stepwise actions over fifty years of mysteries were indeed leading to one goal. Knowing the goal, I reasoned, it should be possible to forecast the next logical steps. So the book also included within its presentation several terrible event predictions expected to take place in our near future. Thus far, though I do not claim to have gotten all event details precisely correct, many terrible forecasts have already come to pass. Among these were:

a) an assassination attempt on Ross Perot or his family to cause him to drop out of the Presidential Race, a matter which indeed transpired using mailed Anthrax according to a Secret Service back channel contact;

b) the false flag downing of the World Trade Center by civilian passenger jets which;

c) resulted in a series of Middle East Oil Wars. Other predictions include two more terror plots which are part and parcel of this blog post. Those are…

d) a false flag nuclear attack on Charleston, S.C. and Portland Oregon (the later of which I have already thwarted, it seems – see middle of my home page), and more to the point…

e) MASS SHOOTINGS.

Note: you can get a free copy of Vol I of Fatal Rebirth (ebook) by email request to pppbooks at Comcast (net). You will be glad you did, as it will take you far deeper into the Rabbit Hole than Alice or Neo had ever gone. This pill is black, though trimmed in red, white, and blue.

So, if ready to suspend your belief structure, let us begin. Pretend there is, despite media’s recent attempt in the Cincia shooting to portray anyone who believes in the New World Order as mentally ill and anti-patriotic, that such a conspiracy is actually afoot. Also pretend, if you must, that Political Control Technology in the form of the Manchurian Candidate is real. There are real-life Jason Bournes out there, as my book, MC Realities, and other books on Political Control Technology illustrate more than adequately. Even the Smithsonian channel knows.

This will make the key postulations, testing methods, conclusions, and proofs of the core material easier to accept, especially as they will be offered in the manner of scientific discovery — exactly as I undertook them as investigative writer. You will, in fact, be able to retrace my work to double check it, if you wish — as long as you review the full series of posts and sidebars before you attempt it, lest you make a critical error.  Please subscribe to my blog pages to insure you are notified as the remaining posts in the series are added.

Are mass shootings are by intelligent design?

The Investigation

Jason Bourne… though fictional, is based on real-World programmable assassins. Do you suppose CIA or anyone else would not find something useful to do with failures in such programs? Might they not make excellent disposable patsies? Image/film: http://www.imdb.com/title/tt0372183/

Some several months ago, insulted by media’s misreporting of Aurora and Sandy Hook and outright clues that a disinformation campaign was afoot, I began finding ample cause for concern.  But how might one determine if other mass shootings were arranged as part of some kind of sick criminal conspiracy, one which might involve both real and faked shootings?

I started with several basic presumptions of truth, and then set about to see if the logical evidence such presumptions would require were indeed in place.  The ‘illogical’ presumptions fostered by the Unified Conspiracy Theory requiring suspension of belief are as follows:

1)    That Shadow and their Globalism requires destruction of America, and its Constitution in order to enable forming the North American Union, a matter which in turn requires that the Right to Bear Arms is first invalidated, and arms confiscated or gun owners otherwise neutralized in a manner similar to that of the Australia;

2)    That the New World Order, the modern day Illuminati, if you will, would be well capable of undertaking a campaign of gun violence for such cause, but being an Illumined Power Elite lost to Satanic and Masonic mysticism, they would employ mystical constructs which would leave detectible footprints if knowing what to look for;

3)    That the principle tool of such a plot would involve a small army of patsies, cut outs, and fall guys, principally from a category best known to the public as Manchurian Candidates. It may additionally involve a small army of blindly obedient members placed within our armed forces, the intelligence community, and law enforcement to aid more indirectly in supporting roles. This would include logistics, psyops, and cover up, or even command and control, generally unaware as to the truth or reason behind their orders. These are the same players frequently found playing key roles in the lives of mind control victims at large.

All three presumptions must be true to make a proper accusation, for they comprise the basic proofs of any crime: Motive, Opportunity, and Means. Normally, we think of opportunity as meaning access to the scene of the crime, typically proven by forensics such as fingerprints, or better yet, actual eye witnesses. In this case, they deliberately left their fingerprints, in a manner of speaking. In fact, the bulk of the proofs fall into this category, perhaps even naming individuals behind the plot. At the very least, we are indeed dealing with the Elite, those involved in principalities and powers.

Indeed: Two names have already surfaced by such clues, and both are billionaires. I also have a dozen other names of likely conspirators, but no names are released; these things are my Life Insurance Policy.

Sidebar PostOn Programmable People. This sidebar post addresses the notion of the possibility that at least some mass shooters are mind controlled patsies, and reconciles their coexistence with truly random shootings ­­— those which are more naturally spontaneous crimes — which can collectively still both be component parts of the same intelligent design.  This leads us to the finer details of how shooting event locations and dates lend importance to our consideration, and just how these things can additionally reveal intentional, yet concealed clues.

Here it should be mentioned, that many observers of the New World Order crowd favor the supposition that among their leadership we might find the modern-day Illuminati in spirit, if not in actual blood lineage, even though they may have since assumed a different family name. By way of example, in my research, I have had reason to conclude that the Rotheschild name was assumed; those assuming it being Knights Templar in hidding, their wealth derived from Templar treasure, and not truly Jewish by ancestry or faith, at all.

Many who favor the notion of a Modern-day Illuminati additionally believe, as do I, that there are at least two, and as many as four groups competing with each other within the movement to be the ones ‘honored’ to have one of their own selected to become the Antichrist. Much of what is discovered in this investigative series will point to this being true in one way, or inherently implied in another. It is, in fact, one very good reason to employ symbolisms and other clues which act as signatures of those so bidding for selection.

Such evidence was abundant, even easy to find, and I remain convinced that the trio of presumptions are sound enough to warrant seeking incontrovertible proofs. I sought such proofs both in quality and quantity sufficient to illustrate that ‘random’ was not the right word to describe mass shootings, but rather, ‘intelligent design,’ is.

The path of my continued investigation led to endless shocking discoveries, but there was a problem: to describe the methods and explain findings to the casual reader would, it seemed, require a tedious educational process and boring, repetitious citation of facts. It would be about as fun to read as a spreadsheet or database. Not good.

People want visual sound bites easily grasped. More so if Sheeple content with their Evening News and easily frightened off by words like ‘conspiracy theorist,’ and ‘New World Order,’ or similar. Worse, the investigation bogged because of the real life tragedies each shooting represented. Proper investigation meant exhaustive study of individual events, reviewing endless horrific detailed accounts and sad, brutal media imagery. It was taking an emotional and even physical toll upon my body and mind, and my spirit. Eventually, instead of plodding along 10-14 hours a day as at the start, I found myself barely able to work on it a few hours a week.

I played with several ideas on how to present the story NOW, without completion of the full study, for there is indeed already a mountain of proofs uncovered. But again, the complexities in presentation left me feeling it a hopeless task. Finally, I decided to break it down into about a dozen short compartmentalized components suitable for a series of blog posts. Frankly, I’m hoping it will spur someone to offer useful help; it will take funding and staffing to properly complete the study. Or better still, perhaps some Sheriff or other authority will assume the duty as result of shootings in their jurisdiction.

Follows is a synopsis of the Ten Proofs to be presented. There will additionally be, at appropriate points, companion posts detailing the scientific methods or other analytical procedures involved in select proofs where a doubting Thomas type may wish to challenge the validity of claims. I firmly believe that for my proofs to be accepted, they should be presented in a way such that ANYONE can duplicate my work and verify accuracy and conclusions.

This is a legitimate investigation despite its atypical and unorthodox methods and odd topics involved. NOTE: links will NOT WORK until the various posts involved have been posted. You may click on them to discover their current state. Again, subscription to this blog will notify you when new posts are added.

What are the ten proofs of a mass shooter conspiracy?

The Ten Proofs in review…

Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns;

Any time you find a cover up, you necessarily have a conspiracy to contend with. Gun grabbing groups, including government and biased or puppet media forces, should be using every opportunity to make their case for gun control, but act as if the bulk of gun violence never took place. Why do they employ selective blinders? There is a reason.

Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters;

The Illuminati loves magical numbers, as they can translate into meaningful words or names, or leverage ‘spells’. Interesting then, that basic shooting statistics establish set after set in the most magical and potent number of all, one which decodes to ‘Satan.’ This alone reveals dramatic coincidences well beyond the possibility of random chance.

Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines;

The same Dispersal Pattern Studies method applied by government researchers to UFO sightings reveals Mass Shootings do something UFO sightings allegedly do not: form repetitive patterns with GPS accuracy, doorway-to-doorway-to-doorway.

Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes;

When it comes to symbolism, nothing outperforms a graphical shape. Better still when that shape itself has magical properties or relationships to other shapes, or its own hidden or obvious meaning. 

Proof Five: Shapes in Turn Form Complementary ‘Magical’ Clusters;

It defies odds that perfect shapes should cluster together in ways which share overlapping lines or corners, and be generally both aligned and mirrored in additional symbolism.
 

Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols;

Select shootings define such symbols with precision. Masonic Symbols are rendered in 3-D. Satanic Symbols are positioned correctly for magical application by Warlock.

Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart;

Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View;

The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.

Proof Nine: Shooting Sets Share ‘Magical’ Data Points Which Decode to Messages;

Shooting line sets share three or more identical magical numbers within their data points. These decode to tell us when and where the next shooting will be, name a shooter, or perfectly prophesy some specific outcome.

Proof Ten: Individual Shootings Examined in Micro Duplicate the National Study Proofs

Two examples are offered; Aurora and Sandy Hook. They not only duplicate the ten proofs, but they mirror each other and one points to the other.
Why are mass shootings on the rise?

Are you ready of this? Buckle up!

So let us begin. I propose your best bet will be to SUBSCRIBE to my blog pages so that you are automatically notified as new posts are made to complete the series. Please link, share, tweet, etc., and by all mean vote your ranking at page top of each one, and comment with your questions, criticisms, or thoughts. How else will other know this is important?

Do bear in mind as you read, each offered proof individually seems to defy the odds or logic path required for truly random shooting events. Collectively, it is monumentally clear. Also bear in mind that I am human, and I, like any other, am prone to making mistakes. A ton of information had to be entered and copied from one location to another multiple times (multiple database and software applications). Therefore, either because of a mistake on my part, or perhaps because of a mistake in media or other accounts/records, any given individual data point in any given set of proofs may be found invalid.

By all means let me know if you find such a discrepancy, but please remember this: a single error in a single data point does not invalidate all other data points, and therefore, does not invalidate the conclusions or the suppositions, themselves. In order to dispute my findings, you will need to offer proofs that the method is flawed, the entire data set was in error, or analytical logic was faulty. More: such dispute must address and ultimately invalidate all ten proofs, or short of that, offer equally viable alternative explanations which fit the findings and afford a more innocent explanation.

Since each proof tends to defy all possible odds of random coincidence, and does so consistently, again and again, naysayers will have their work cut out for them. More so, because in many cases, control groups have been established to show truly random data points enjoy no such pattern. I have done my homework, and carefully so.

I will demand the same of naysayers.

Go to Proof OneGun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns

Go to Side Bar: On on Programmable People

 

How Social Network Trolls Target, Track, and Psychologically Profile You


How to spot and deal with Trolls, including a clever tool they use in any social media capable of posting images (VERY prevalent on Facebook), and quite insidious with far reaching implications. BEWARE: you betray yourself and your friends if you take things at face value.

What is a Web Troll?

by H. Michael Sweeney

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

How does being a web troll work?

UPDATE: Nov. 11, 2014 Perhaps as if to ‘test’ me as result of this article (or not), a Web troll began the process described herein to goad me argumentatively  while also employing a good half dozen of the usual disinfo tactics in the 25 Rules of Disinformation (linked below). So I unfriended him and watched: that same day, ‘someone’ created a new FB account and almost immediately friended two of my friends, posted ONE activist post, and ONE peace post, then requested to friend me. Sure. OK. BUT I HAVE MY EYE ON YOU, because that’s how easy it is to get a new identity and hook back up to a target. Not that I care. Trolls are tasty.

Are you being targeted by online government trolls

How Social Network Trolls Target, Track, and Psychologically Profile You

Reading this post you will learn…

•  That there are three basic kinds of trolls and subsequent ‘missions’ against targets like YOU;
•  That there are troll profiling and tracking tools or methods which can be recognized;
•  That there are ways to protect yourself without drawing more unwanted attention; 
•  That the Troll represents a danger in that their ‘assessment’ can lead to escalation in your targeting.
Is social media infiltrated by government trolls?

Government and Commercial Trolls

Consider, for example, the friend ranking and layer’s of affiliation tracking tool. A graphic is created containing a simple textual message. It is graphical because there is no easy way to distinguish between two identical text messages, whereas, altering a single pixel’s color by 1 imperceptible shade of difference makes it unique, and allows thousands upon thousands of individually trackable versions. A Troll who has managed to friend a targeted person of interest then posts the textual graphic as if a sincere request. Examples will be shown.

These kinds of posts seem innocent enough and easily get spread as requested, allowing simple computerized search processes by FB’s intelligence community or marketing partners to see not only who is close to the target party, but at what layered level and loyalty or, if you prefer, like minded thinking. In point of fact, ANY image shared with a given political, philosophical, religious, or other belief or emotional message can be so tracked to perfectly define each such poster’s psychological profile, and rank their threat level to the paranoiac governmental powers that be. The same is true of marketing trolls seeking to learn about your product usage or demographic, etc.

The only safe share, then, we might presume, is textual or perhaps the sharing of a URL and it’s image, or an image we ourselves create and have perhaps included in our FB albums. Even with URL’s however, the possibility exists it is still being tracked, especially if a Troll operated resource such as Federal Jack, a known DHS sponsored Sorcha Faal disinformationa conduit targeting conspiracy theorists, activists, and other ‘potential terrorists.’ Their goal is to get you to ‘share’ their links, thereby spreading disinformation while psychologically cataloging YOU and any of your friends’ beliefs; all who click to learn more. They may need to have a troll assigned to them, after all, for being yet another ‘potential terrorist’ — a free thinker, patriot, constitutionalist, etc.

Worse, we have learned from our new Paul Revere of the coming Second American Revolution (Snowden), that NSA is not only monitoring FB activities big time but that Trolls from NSA, FBI, DHS, DOD, and even the FED, and other paranoid agencies, and even corporations who have a strong and growing list of people who think ill of them, like Monsanto and some banks — all regularly maintain false social media identities for entrapment and spying purposes. They even infiltrate online gaming. Snowden’s latest bombshell, according the foreign media analysts, indicates there were so many game Trolls that it was starting to change the character of online gaming, and special tools had to be developed so that Trolls would not end up targeting other Trolls and more easily remain inobvious. We are talking here, about games with chat or other communications capabilities within the game or as part of game support, especially when in a social network manner.

And it is clear that snooping is also rampant among commercial interests, which is certainly true in online gaming, which after all, is a commercial enterprise. FB is perhaps the biggest offender in this area.

How can you spot a social media troll?

Differentiating an innocent graphic from a potential spy tool…

There are several online graphical message generating services. FB themselves seems to be hooked up with one called your-ecards (.com). Another is someecards (.com). Anyone can use these to generate a simple textual graphic with or without use of stock illustration graphics (e.g., a man looking perplexed), typically in silhouette or line art form. They can then easily share it through their favorite social media(s) with a few additional clicks. These can always be recognized because the logo for the creating Web service is displayed at the bottom. An additional hallmark of such services is that the background is almost always colored, and there are scant few colors available. The default color or otherwise most popular seems to be pale blue, pale green, or yellow-orange.

So when you see a colored background, typically with larger or fancier text than a normal posting, you are clearly looking at a graphical text post. The next thing to look for is the logo. If you see a logo, it was likely a sincerely generated message by a genuine human resident of social media. However, if there is no such logo, the message may have been generated by a Troll using his own computerized tools to psychologically target you regarding a select individual hot button. Are you, for instance, a tax protester, pro gun, anti GMO, for or against a given politician or political topic, or simply, who is a good like-minded friend of yours as opposed to some stranger you’ve accepted on the Network. Such messages also tend to be minus any artwork — text only. There is one more defining clue to look for.

Because there may be multiple versions of the same message for targeting different individuals by multiple Trolls interested in gathering information about many someones, there is a need to tell one shared message copy from another, which is exactly why it needs to be a graphic.  YOUR version must be physically different from MINE. The simple solution is to vary one or more pixels in a way easy for a software routine to detect, and then match to a targeted individual and their Troll/need. Given the countless millions of users on FB (and other social media) who might be deemed targets, it may mean that many, many dozens of pixels will need to be manipulated. My research shows that, indeed, most of the suspicious postings, in addition to missing the logos, have such visual manipulations. Examples:

1146548_664505843574765_1740298350_n

This is an example of a Troll-generated chain letter designed to find out your religious views, and who among your friends is of like mind. Note the guilt factor in the last sentence, and no true traditional Christian message. Note also the dark aberration, a visual flaw above the numeral 9 of 97%.

1005209_10201199164735487_1499677395_n

This is an example of a Troll-generated chain letter designed to find out more about your true close friends, as opposed to casual Network contacts you don’t personally know. Again, note the visual flaws in the slightly darker ‘blur’ areas about the letters… you may need to zoom in. This phenomenon is common in such messages, creating a pool of pixels useful in manipulations.

So one needs to look for such abberations or flaws in the background, usually darkened pixels along the edge, most commonly gathered in clusters or strips. You have to ask yourself… if going to the trouble to create a custom graphic for a text message instead of simply typing it in, why would they: a) choose the ugly colors used by such as your-ecard if not trying to make you think it such; b) take the extra steps to strip away the logo if using such a service (the point being they did not); and c) end up creating an image with a flawed background (where did the aberration come from, if not deliberate)?

When these clues are present, you are staring at a Trollish spy tool. To then share it betrays and catalogs you and links you and your beliefs with any of your friends who do the same, and theirs, and so forth, on down the line. The proper thing to do is enter into the comments: “I suggest you delete this post because it fits the description of a Troll’s chain-letter spy tool to catalog, track, or psychologically profile and establish links between like-minded persons: learn more here: http://wp.me/p1GyKw-zi” That link goes to this blog post you are reading.

Then I suggest you share the post anyway with a similar message, “Share this to warn others about Troll spy tool chain-letters to catalog or psychologically profile and establish links between like-minded persons. To learn more about this tool, visit this link http://wp.me/p1GyKw-zi.”

Finally, look carefully at the original post. Most social media will have a means to indicate if it was itself being shared, or was a direct post. If direct, it’s YOUR Troll. If shared, the poster was gullible in sharing, and is not likely a Troll… but beware that that could be arranged for as a deceit — so watch to see if the poster repeats the ploy frequently. You might optionally go to the ‘cited source’ of the share and try to find the post on their wall if you want to try to see if they are the Troll, and on to the next if not, and so forth, posting or messaging those encountered along the way who are victims, if you can. But that can be a LOT of work.

Are social media trolls sociopaths or psychopaths?

More Direct Trolls; Psyops and Sociopaths

The real threat to activists and politically incorrect persons online, like myself, is government agents paid to do nothing but sit in front of a computer and pretend to be your social network friend, someone you don’t really know at all, of course. They don’t just post Trollish images, they comment, and even message you. Like the aforementioned tool, they seek to learn everything they can to psychologically profile you, as well as see who ‘likes’ your posts and what THEY comment. But they are also there to play mind games. You are officially a victim of psychological warfare, perhaps even by someone from within the U.S. military, or even the military of another country. They are quite often sociopaths, so chosen because those traits make them more efficient.

Here are some tips on how to spot and deal with this class of Troll, as well as the kind of Troll who is simply out to make trouble for a given collective of people who believe a certain way about a certain topic. You know the type, my favorite example being the warrior Atheist who deems it his life’s mission to ferret out believers in God and annoy them with endless barbs and zings as if they were evil and dangerous for daring to worship. These people will wax sociopathic, too, and even psychopathic, when given enough rope. UNFRIEND these kinds of Trolls.

Hint 1) Trolls work in packs or maintain multiple identities to be a self-contained pack. That way, if you delete one of them, others survive, and then they generate yet another new identity and friend request to maintain the pack. The advantage is that you can suffer a series of ‘In deference to your view, we all seem to believe the same (whatever)’ posts (i.e., you are an idiot on this matter). Sure. You might be an idiot. But at first, the pack is all positive and flattering to your own beliefs so you a) get used to seeing them, and b) start respecting their beliefs and presuming them the same as yours. That’s the worming in stage.

But when it is appropriate for profiling or attempting the role of agent provocateur or disinformationalist, they will all suddenly be believing in something more off the mark, and increasingly so, as often as not. But by now, you like them and their beliefs, and so, your reaction tends to be as they expect; they are pulling your chain, and observing your jerks, evaluating, and cataloging, attempting to modify your behavior through deceit — a form of mind control. Can you be controlled, or are you firmly centered in your beliefs? Are your notions your own, or being foisted upon you?

Hint 2) New Troll requests tend to be persons with scant history on the network, and very few posts, but posts akin to your own in substance. Note that Facebook asks you to suggest friends to them. NEVER do this unless someone you ACTUALLY KNOW in the real World. If you do it, you are giving them a list of new targets. Since I don’t fear and even enjoy playing with Trolls, I let anyone into my friend list, but that does not mean they get what they want from me. But you may be better off simply passing on marginally viable friend requests.

Hint 3) Try posting something deep and yet somehow provocative (in the eyes of the establishment) which requires a bit of reading and thought before drawing conclusions. Look for a pattern in response from the same suspect persons; a) almost instantaneous response in the manner of (Hint 1), and typically emotional rather than logical in nature. This is almost always short and designed to be inflammatory or provocative, a bit testy. This is followed by b) one or more secondary (pack) responses delayed rather a bit in time. These will be more in depth and thoughtful, and validate the former with logical argument, and may contain a link to give further credibility. Other brief pack replies may be sprinkled in for effect. Collectively, they are all in agreement regarding your idiocy (or whatever).

It is when the same people tend to respond in these patterns that you are very likely dealing with a Troll pack. You will find this is true regardless of what time of day or night you post. They never sleep because every psyops Troll is actually three people manning a keyboard around the clock. They can always respond quickly with the first response, but the careful response requires that they actually research and formulate the best supporting answer based on all they know about you and the topic, which they might need to first research, and likely, it involves a supervisor’s approval or must be compared against preset guidelines.

Hint 4) Thick skin, undaunted. There is nothing you can do to make these people not remain your friend, short of unfriending them, yourself. While they may match or even exceed your own expression of ire, they won’t go away no matter how you might choose to argue, or confront with insult. Indeed, they tend never to deal with insults directly, at all; they are irrelevant and serve no usefulness to their goal. A real person has an ego that must be defended, but they are just playing psychological games and feel superior regardless of what you say. But when you argue, watch out for the next hint, which is commonly employed in their responses.

This is also true of the sociopathic/psychopathic ‘cause’ trolls.

Hint 5) They tend to employ the 25 Rules of Disinformation. Easy to spot, easy to deal with, if you know what to look for. Be careful, though, because ordinary people sometimes use flawed presentation style or less-than-thoughtful posts which on the surface appear to fit one or more of the rules, when they are just being human. Watch for repeat performances, to know the difference. Give them rope.

Can trolls lead to real-world targeting?

Dangerous escalations; why we dare not ignore trolls

The real danger in online Trolls is this: their whole purpose in targeting you online can be to determine if you deserve real-World targeting, as well. With a few keystokes you can end up having your entire life put under a microscope; phone surveillance, tails, observation posts, bugs and cameras covertly placed in your home, mail intercepted and snooped, and so forth. Men in Black stuff. Its why I wrote The Professional Paranoid; a how-to book on detecting and dealing with this kind of targeting.

And, it can escalate further: electronic harassment, dirty tricks, political control technology (mind control) to make you look mentally ill to others, destroy personal relationships, wreck your income, and sabotage your life. For that, I wrote MC Realities, another how-to.

But it can also lead to the worst of all possible escalations; NDAA vanishing. If truly a pain in the neck to the government, a threat which needs to be dealt with more urgently… you can ‘legally’ (so they claim) kidnap you and make you vanish without any legal process. They can elect to torture you or give you over to some other country for ‘processing.’ Or, if they want, they can murder you and dispose of your body. This is how we know we are living in a tyrannical Police State, and why, then, government dare not tolerate free thinkers without Trolling them, and trampling on rights and freedoms at every turn, and why fear mongering is their number one justification. ‘Oooh… terrorists are everywhere! We need to TSA and NSA your ass for your own safety.’

What should I do if I encounter a social media troll?

What to do with a Troll

I personally do not mind their presence so much as some might. I enjoy providing them with disinformation, or provoking them to try to chase down a given pathway of dialogs only to suddenly drop the matter as if it never happened, or I don’t really care, or even was deliberately jerking their chain. I even kid them.

But most people would prefer to unfriend them, and there is NOTHING WRONG WITH THAT. Just know they will be right back with a new identity. It may be better to deal with the ones you know than to worry about finding the new ones you don’t yet know.

My favorite thing, however, is to educate them. I like posting factual material which challenges their personal beliefs that their job and their boss are operating on valid or just principles or beliefs, and purposes. I make them ashamed or feel guilt, whenever possible. It does not work with everyone, of course, but it is fun to try.

Are social media trolls dangerous?

Conclusion

Your privacy and personal safety could be at stake if you are in the hands of Trolls. The threat level is determined by how much our paranoid government fears people who fear government’s growing fascist police state/spying mentality, and dare to talk openly about it.  The more vocal you are, or the more aligned with or closer in links to others of like mind, or the more active you are elsewhere on the Web, or the more followers you have, and even the kinds of searches you make (that, too, is being watched by government) and certainly, your own original postings… each of these things determine if you might become the victim of someone else’s Troll, or have a Troll assigned to you, and what kind of Troll.

And once your ‘threat level’ has been assessed, that could lead to escalations that you will not likely want to experience. If you get a sense that such escalations are already in place or happening, by all means read my books, because they will help you know for sure, help identify the players, and form defenses. You can also contact me personally for free and for-fee online consulting or direct intervention services.

It’s what I do when I’m not being a thorn in the side of tyranny… and attracting Trolls.

Gun Shops, Grocers, Other Retailers Key to Disaster Survival


When the stinkiest FEMA kind of stuff hits the fan, anyone who has a business dealing in key resources will find their valuable inventories and property at risk of sack and pillage by looters, or outright theft by government. There is a way to protect such assets while at the same time insuring better chances of survival of families.

How do I protect my business in a disaster?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What can gun shop owners do to protect against gun consfication?

The Threat to Business Property is significant in a disaster…

Korean shop owners (rooftop) defend shops during LA Riots to augment or supplant Law Enforcement (click for riot details)

In the prior part of this series we reviewed a wide variety of disaster situations that make emergency preparedness an ultra-important concern for families, reasons far more serious and far reaching than mere quakes, floods, or tornadoes. In the second part, we proposed a disaster preparedness plan much more comprehensive and truly useful than that advised by FEMA/DHS, albeit one government will never approve. Why? Because it’s closer to their own preparations and mimics their own capabilities, and removes you from dependence upon them. That means they cannot control you by being your only source for key survival items.

But the previous material addressed family needs from their perspective. And, there were certain aspects of such a plan which would prove difficult for many families without the help of an outside party. Then we have businesses to consider, who have their own unique concerns as to what happens in dire emergencies. Business owners or responsible managers of many kinds of retail and other business with select kinds of inventories or resources, should be every bit as concerned as a family, and looking for a disaster preparedness plan which specifically protects their valuable business assets, both real property and inventories.

There are several key reasons to consider this a critical concern: One, many disasters are deemed Acts of God and are therefore not included under insurance provisions unless, perhaps, paying extra premiums for specific policy riders such as a flood or tornado insurance. No insurance policy provides protection against acts of war, which includes revolution, military coups and similar political unrest, often even excluding protection against riot losses — regardless of the cause of the riot.

And beyond the worry of insurance protection, FEMA’s plan for your assets in an emergency will very likely include confiscation and take over of your property ‘for the good of the community.’ Similar concerns exist in any Martial Law situation. So if you have such a business, you should worry and wonder if there is not some way you can protect your assets from such total or near-total loss or take over. Never fear, the Professional Paranoid is here to help…

What will happen to gun shops in a FEMA declared emergency?

Partnering with Family Collectives

The prior posts in this series dealt with idea of forming multi-family unit collectives for improved emergency preparedness at the family level, as well as why such preparedness plans and kits should go well beyond minimal FEMA advice and prepare for long-term disasters, not just three day fire/quake/flood protection. This involved numerous considerations and plans in terms of organization and supplies, individual responsibilities and more. But for many such collectives as might be established, some items become difficult to come by or store due to cost or special attributes.

The bottom line is, in a serious emergency situation, looting and general criminal activity become a serious threat to any owner of a business handling inventories of critical resources which are also valuable to long-term disaster kits. Often just as important, many such inventories represent a storage problem for long-term home survival kits. Gun shops especially, and even food or fuel can be difficult to store in quantity suitable for a long-lived disaster. Many more items could be added to such a list, as a given collective of families will have their own unique set of limitations and issues to resolve. As result, even a motorcycle shop or car dealership, auto parts store, tire shop, or tool shop, may find themselves in the same position as a gun shop. In some communities, for example, boats will be a key product in need of protection and in demand as an emergency item. So there are many kinds of businesses who can take advantage of the ideas offered here.

My goal in this series of posts was to attempt to find a solution addressing both these concerns by partnering family collectives with such owners. And, the word owners could in some cases mean ‘managers,’ where owners are corporations or persons who do not themselves manage and/or live near enough to ‘take charge’ for the purpose. Such partnerships are simple: the owner joins or heads a family collective, either one they formed on their own (perhaps made up of employee families), or by joining with someone who approaches them with an acceptable offer.

In some cases, such as gun shop owners or owners of vey large facilities (e.g., super market,), they may wish to partner with multiple collectives. This is because in the event of worst-case long-term disaster scenarios, there may be a need for significant armed resistance against third parties, even to include unconstitutional seizure by Federal forces. By unconstitutional, I mean in the event of an attempt to overthrow the government by the military, or armed insurrection to restore the Republic against some other form of tyranny.  We will know that horse when it rides into town; mass arrests or attempts to seize weapons door-to-door will be its hallmarks.

We all remember the LA Riots? Even though the National Guard was deployed, it was up to citizens to protect their own property. Neither soldier nor Police and Fire were of much help. Korean family-owned businesses gave us the model we need to consider following; they armed themselves to the teeth and took to the roofs of their stores and residences and fended off looters. Family units can band together in like fashion, and better yet if also joining with a one or more business owners in some mutually beneficial arrangement.

Gun shop owners, in particular, have a serious need. They become the highest-value target in town, and therefore, need many able-bodied people to bear arms — in sufficient number to become a significant deterrent to assault. This works well for the families involved, as well, providing them with low or no-cost access to weapons needed to protect their families and homes. The trick is to find ways to do it which do not amount to simply giving away inventory. Not a problem, given that provisional contractual agreements can be drawn up in advance.

How can we prevent government confiscation of our business assets in a declared emergency?

Making it work for all concerned

I propose that such partnerships might be best approached with a contractual agreement for mutual protection. The agreement should provision for both the possibility of taking possession of weapons and munitions immediately and only after a serious event transpires. It might provide for trade of ownership of weapons deployed once the crises is over for a minimum guarantee of service to the shop owner providing protection of the business property.  Weapons can be deemed as ‘rented’ during the disaster with options to purchase afterwards, perhaps with rental applying to the price, or may be considered as ‘payment’ for protection helps rendered, or some mix, thereof. Such items, pre any event, need not be fully deployed to family possession, allowing for normal inventory turnover so that older inventory is sold off and replaced with new, and families don’t need to worry about storage.

Take a gun shop: Only if the family collective partner wishes to take possession (ownership) of weapons for storage at home up front (the suggested kit calls for one pistol minimum), need any money change hands. Once a serious emergency transpires, the families can be issued the additional firearms from shop inventory, and sign for them. They must keep them safe, and must use them on call or by schedule in protection of the store property. It would only take one person from each family unit at a time, given the quantity of family partnerships participating — to adequately defend the store. They ‘pay for what they use’ in the form of a rental/purchase option to be addressed after the emergency ends, perhaps involving payment terms (perhaps involving very small payments pre disaster). There are any number of creative solutions to make it mutually viable.

I am no lawyer, but in a civil emergency, many laws fall by the wayside as a matter of practicality. A gun permit process is not something you worry about when the government is shut down and lives are at stake. However, a wise shop owner might want to check with a lawyer and get some advice and deal with such concerns up front. There is no reason a single individual from each family collective could not undergo a permit process as part of the contingency preparation. What they do with the weapons in an emergency should at that point no longer matter to the shop owner, with reasonable agreements to avoid illegal uses in place. One might also want to address how to safely store key records in order to insure lists of gun holders are not compromised and lead to confiscations, anyway.

Other kinds of businesses? Consumables such as food from a grocery store which have dates of expiration would be lost, anyway, so any financial arrangement to distribute storables in an emergency with any level of appropriate financial reimbursement or property protection services of participants should, IMO, be eagerly embraced. For most shop owners, it converts a disaster where they face the potential loss of all inventory and significant property damage into a situation that more closely approximates the ultimate ‘sale’ where all inventory goes out the door to happy customers, AND the property is protected.

From the family side, a collective should easily be able to field 6-10 adults to defend as many different business sites simultaneously, while still retaining sufficient adults to protect the home base camp. Therefore, they have access to 6-10 different key survival items they might not otherwise be able to afford or store long term. It is a win-win situation for everyone but looters and would-be confiscators.

Upon event occurrence, family members ‘report for duty’ and are issued weapons, sending the appropriate portion back to the family for home defense and protection from confiscation by FEMA/Military.  I propose an organized convoy is the only safe way, as otherwise, armed interlopers might dare to ambush a lone person or single vehicle. I further suggest that, if not already the case by natural instinct, a strict military-like organization and rules for command and engagement be established. Such a model should ideally trickle down to the family units as well, if a long-term event is involved.

Therefore, prior military service, especially in combat or involving combat training, is to be highly prized in any collective or partnership. Where such experience is found in a retired Officer (as opposed to an enlisted rank), so much the better. If there is additionally someone with prior intelligence or forward observer experience, or demolitions or military engineering background, better still. Likewise for any medical corps. or other medical background.

In closing, the business itself should have on hand sufficient stores of foods and other resources (as opined in the prior post) to sustain several months of a ‘stand off’ in defensive posture. A key factor will be the ability to communicate with partnering family units that they may be called in to provide force rotation, deliver emergency supplies, or outright tactical relief against assaulting forces. The prior posts cover communications alternatives in a total outage of all utilities.

How can I protect my business as well as my family in a disaster?

Revolt Against Mongressanto: GMO Crops Torched in America


Though a controlled media is suppressing the story, 40 tons of GMO crops were torched, prompting an FBI investigation. We The People do NOT WANT GMO, and if the Monsanto Congress does not watch their step, arson will become outright violence, and from there, even lead to revolution.

Why were sugar beets set on fire in Oregon?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

Who is Oregonians for Food and Shelter?

Update June 22, 2013: Additional research reveals some interesting things about the who and why behind the $10K reward offered for the beet burners… at document end.

Are Monsanto and Syngenta GMO criminals?

What you will learn reading this post…

  • People are taking the law into their own hands to kill GMO production[
  • There is an apparent media blackout, even on the Web;
  • The government is ramping up for what may end up being another WACO/Ruby Ridge standoff;
  • We may be looking at the Boston Tea Party of 2012 just before the next American Revolution.

Who is the earth liberation front?

Rebirth of the early Earth Liberation Front?

I Can’t Believe I’m the FIRST and ONLY one to report this on the Web.

Our new Boston Tea Party?

Our new Boston Tea Party?

NOT ONE MEDIA OUTLET outside of local circles has dared to mention it, perhaps because government fears that if the public learns that other people are getting fighting mad (literally), they might join in, and become an actual revolution. It was only reported locally live on KXL Radio and echoed by the Oregonian, where the ONLY Web mention exists, hard to find because the headline wording is carefully avoids the most likely keywords for a search — took me rather a while to find it. Here’s the scoop — PASS IT ON!

40 Tons of GMO Sugar Beets were set ablaze in Eastern Oregon, yesterday. FORTY TONS — the entire acreage of two full fields of crops IN THE GROUND were set ablaze over a THREE NIGHT PERIOD OF TIME. That means ARSON. And I have to say I am cheering! The only way could feel better about it is if I had dared to do it myself — which to be clear, I would not: I don’t look good in prison orange, and would be too worried about possible loss of life if things went terribly wrong.

Evidence is that 6,500 plants were destroyed BY HAND, ONE PLANT AT A TIME. That, in turn, implies A LOT OF PEOPLE were involved: would you want to stick around once a fire was going and wait to be discovered? No, someone (many someones) probably wanted to move as quickly as possible. WE ARE TALKING ABOUT A MOVEMENT, a kind of ORGANIZED REVOLT — and this is exactly the kind of retribution I’ve warned was coming; when lawmakers and corporations refuse to honor the Constitution and instead engage in ‘legalized’ criminal acts such as enabled by theMonsanto Protection Act.’

This is all shades of… well, the BOSTON TEA PARTY. Instead of throwing tea into the harbor to protest taxes, someone was throwing flames onto crops in the ground to protest New World Order shenanigans. We are a long ways from Boston, but more recently we have the Earth Liberation Front, a group which also had its roots in Oregon (I love my State and our people; we have core beliefs and fight for them). The ELF, in 2000,  burned the offices of a GMO research project at the University of Michigan, a project funded by the Federal government and Monsanto at the time.

The ELF, or ‘Elves’ as they are sometimes called, is an ad-hoc group with its actual origins in the U.K. But forest mismanagement caused splinter cells to be established in Oregon, and subsequently, Michigan and elsewhere as new corporate wrongdoings became evident. Like the IRA, they have an official, public side, one not associated with criminal adventure, and instead focused on educating the public on the issues, such as the Gulf oil spill. They are a kind of militant Green Peace, perhaps.

But ELF cells normally come forward immediately to claim responsibility, because to them, its all about publicity to educate the public. Since there has been no statement, I’m deducing it is simply Oregon Farmers who have said, ‘Enough!’ Another clue that may be the case is that this comes on the heels (two weeks) of Japan’s rejection of the entire Oregon Wheat crop for the year (a tremendous financial blow because over 80% of Oregon Wheat is exported) because ONE report said ONE field was contaminated with at least ONE GMO plant.

The rightful fear is, because of pollination processes, once you introduce a GMO crop of a given variety ANYWHERE, the wind and insects will spread its genetic contamination to non GMO fields, and thereby ruin the ENTIRE INDUSTRY for a region. In fact, Oregon farmers have tendered a multi-billion dollar class action law suite against Monsanto, joining a long list of states doing so. Monsanto has experimented with GMO crops before they were approved in 16 states. They were supposedly all destroyed, but state after state is finding out the hard way, that Pandora’s box has been deliberately left open.

But while other governments in Europe and elsewhere are passing laws to ban GMO crops, and burning entire crops themselves, in America, our government is passing laws protecting Monsanto from legal repercussions, and therefore, it seems, farmers are forced to burn the crops, themselves. This means that where in other countries, citizens are being protected from corporate crimes, in America, citizens are forced to become ‘terrorists’ to survive. That’s how blatantly corrupt our corporate police state has become, I’m afraid.

Can GMO spark an armed revolution?

First Blow For the Revolution?

In this case, both fields belonged to the same Corporate Agricultural giant known for embracing GMO, though trying to do so quietly, another reason perhaps big media has kept the story from reaching the Internet. We are talking about Syngenta. Nowhere on their US Web site will you find mention of GMO, but that is exactly what the company is about. They have even lied publicly in writing on this issue with a public declaration. Yet their very corporate name shouts GMO.

But the FBI, and local media knows better (and now, you)… because apparently someone from the Syngenta operated farms mentioned the fact as a possible motive for the arson. This is a serious matter in many respects. It throws down the gauntlet and says, WE ARE MAD AS HELL AND ARE NOT GOING TO LET YOU GET AWAY WITH THIS BULLSHIT ANYMORE! But it also raises the stakes and put lives and property at risk, and if it goes wrong, could end up sparking an armed revolution.

Imagine the likely scenario: the FBI identifies a particular non GMO farmer as being participant and puts together a 100 man assault team to surround their homestead, land they’ve been farming for generations. What do you suppose would happen if they stood their ground? You would have another WACO standoff, another Ruby Ridge. Do you suppose that the other several dozen participants in the crop burning would stand by and let them pick them all off like that, one by one? I doubt it.

They would muster every rifle their families could carry, and call in farmers from adjacent counties, and likely be joined by some number of citizens from the local communities, and surround the FBI and other local authorities. They might even be joined by local Sheriffs, if not out of sympathetic understanding and general GMO angst, then in hopes of defusing the situation. I’m telling you, this can easily get out of hand.

And in a way, I’m hoping it does. Because I think WE NEED A DEFINITIVE EVENT to send a CLEAR MESSAGE and draw a line in the sand: NOT ONE INCH MORE — BACK OFF! It would rally the informed to action, stir the Sheeple to understanding, and FORCE THEM to take a side, lest they end up in a possible cross fire if shooting breaks out everywhere GMO crops and corporate properties exist, and their executives live.

Even though it could easily spark a full-scale revolution, I’m still for it. That threat is not lightweight, either — it is incredibly easy to start and carry out a successful revolution. I’d be tickled pink to live in America, once more, a country based on a social contract called the Constitution and Bill of Rights, where government was BY THE PEOPLE, FOR THE PEOPLE, of the people, and not a fascist police state in the making BY CORPORATIONS, FOR THE NEW WORLD ORDER.

GMO? Burn, baby, burn…

Mongressanto? You may just be next.

Who are Oregonians for Food and Shelter?

Update: The Who and Why of the $10,000 Reward

‘Oregonians’ for ‘Food and Shelter’ sounds like a charity that provides food and shelter, but that’s not right. Their Web site describes themselves in terms which, after thoughtful consideration, would leave you believing them a non profit NGO, a special interest group (SIG) of professionals seeking to educate their peers in the latest timber and agriculture technologies. Closer to the truth, is that they are a Political Action PAC, putting out their own Voter’s Guide, and involving themselves in political matters impacting timber and farming.

Their members are a who’s who of AG and Timber, but with a specific bent toward biotech… specific biotech. Their Boards and Chairs are well peppered with people from Monsanto, Syngenta, and other firms with a vested interest in GMO, and firms they do business with. In fact, there are even two firms represented who have had consensual dealings with Central Intelligence Agency fronts. One of these was harmless and related to fire-fighting, but the other (Portland General Electric) was tied to much darker matters, though I’m sure they were not quite aware of such details. But then, those same folks also went to bed with ENRON (also a CIA operation), didn’t they?

The OFS founder is one Terry L. Witt, who cites himself as a professional Manager of Non Profit Groups, as though you should go see him if you have one in need of management. Really? The Web site was founded in 1999. Within a few months, Terry was writing in support of Monsanto’s patent infringement suit against a farmer over GMO crop migration (contamination) such as faced by Oregon Wheat growers. It would not be the first time he would play hatchet man for GMO, additionally using op-ed in the Oregonian to disinform on behalf of (again) Monsanto.

Indeed, if you look at the one and only truly informational page at the Web site (despite the fact they list three topics to choose from – the other two have no links provided), the topic is… you guessed it; pro GMO. So what is the real agenda, again? But perhaps we should overlook this narrow view, because they do point out their Web site is still under construction. What?

Established in 1999, and still under construction? Could it be because the Web designer is (whois information) Troy, Terry’s son, operating out of their $700,000 home in Tigard? Hmmm. Troy has his own business (he is a photographer and ‘lead designer’ at a ‘design studio’), and his Web site is even more under construction: it consists ONLY of a logo (ergo, my use of quotes). There is not even a statement on being under construction since created in 2005.  “Focused Marketing, Messaging, and Design,” the logo claims.

This could be the trait of (choose one):

a) someone not very good at what they do;
b) a CIA front;
c) a corporate front for money laundering (e.g., payments from Monsanto);
d) a front or over billing a client (e.g., Monsanto);
e) a clever ploy to distract conspiracy theorists and waste blog reader’s time;
f) all of the above.

I’m sorry, but I come away with the distance impression OFS is nothing but a surrogate for GMO interests, and thinly veneered, at that.

That’s the WHO and the WHY of the $10K reward.

Frankly, given these facts, I’d rather someone  offer a $100K reward if they would all simply go away.

Flight 800: At Last! I’m no Longer a Conspiracy Theorist!


For nearly a decade I’ve been trying to get media and the public to examine some simple proofs of a conspiracy we call Flight 800 Friendly Fire; the downing of a jumbo jet killing 230 souls with a Navy missile fired in a war game exercise gone wrong. They only wanted to call me ‘just another conspiracy theorist.’

NOT ANY MORE.

Was flight 800 shot down by a navy missile?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

NTSB admits Flight 800 shot down

http://www.proparanoid.net/800i.htm

DISINFORMATION!

Seven years is a long time in Sheeple years (1 year in Sheeple years = 40 years of apathetic stupidity) and most Sheeple don’t even remember what Flight 800 was about, and some readers here may be younger and simply have no clue, or wish a refresher. In simple terms, Flight 800 was Trans World Airlines 747 jet bound out of New York late evening on July 17, 1996. Twelve minutes later, the plane and all 230 on board were lost in a fiery crash into the sea just off of Long Island. No one knew why, but rumors quickly sprang up that it was shot down by a Navy missile. Even military witnesses said so.

Even faster, the Wag-the-Dog disinformation engine of the U.S. Navy, Department of Defense, CIA, FBI, and the rest of the Federal Government launched one of the biggest criminal conspiracies of all time to cover up the truth. From the very beginning, I quickly involved myself as investigative writer because I quickly spotted traits of disinformation at play, and because I was compelled by a very credible claim that friendly fire was to blame by a revered source.

Non other than Pierre Salinger, former Press Secretary for Presidents John Kennedy and Lyndon Johnson, and former ABC Newsman, said that he was calling a press conference to reveal information from a CIA informant confirming the fact. But he had been set up for a fall with one of the oldest tricks in the disinformation handbook (as result, I wrote the 25 Rules of Disinformation to expose such tricks — my most famous and most read work with over 25,000,000 downloads); he was to become a strawman sacrifice to quash the rumor and associate it with ‘an untrustworthy Internet.’ Hence, the Salinger Syndrome. It destroyed him, but he is a hero for it.

I won’t explain the details of that, here (there is plenty of detail at my Flight 800 pages), nor much else about Flight 800 or the three-year running battle with Federal agents I and other civilian investigators had to endure to simply seek the truth and justice. I will only say that they used every dirty trick to shut us up they could muster, including sending out whole teams of FBI agents to intimidate us in person, Naval Intelligence people to pump us to see what we knew (pretending to be ordinary citizens), and I even got death threats from a foreign agent. Surveillance? You bet, including multiple vehicle tails, various aircraft, high-speed chases, and literally having to walk around Federal and local operatives to get from one side of a public venue to another. They wanted us to know they were dogging us.

But the one OTHER thing they did universally was to discount us by calling us ‘conspiracy theorists,’ and then ignoring anything we had to say. When the NTSB report finally came out, I personally had a field day combing over it and pointing out the obvious lies. They had falsified evidence, concealed evidence, and manufactured evidence to prove it was an electrical short which exploded a fuel tank. But that was also clearly impossible as even their own report showed. For each such point I’ve just mentioned, I was easily able to offer three different proofs. See my Three Simple Proofs (look for the small image of the gold NTSB CD a ways down the page).

But I was merely a ‘conspiracy theorist,’ and so, they still ignored me. Not one local news director would air my material, and the Oregonian flat refused my editorials. Of course, every major Network at the time was owned (controlling interest) by a major military contractor making Navy missile parts. Never mind that the proof was easy to illustrate. I was a conspiracy theorist, and THAT, was that. “Don’t confuse us with the facts, our minds are made up for us.”

Fast Forward a little.

The report finished, only one thing remained. The head of FBI, who personally monitored material I posted to my Web site (I cannot tell you how I know this without someone at FBI getting into a lot of trouble), and the head of the NTSB investigation, all resigned their posts at the end of the affair (publishing of the report), literally walking out on a scheduled meeting with a waiting collective of fellow civilian investigators, family members, and other ‘conspiracy theorists’ who were refusing to buy magic fuel tank explosion as ‘fact.’ They could not bear to look them in the face and lie to them in person, it seems.

With their resignations, NO ONE had ANYONE they could officially speak with, no one who would listen to, much less answer questions or challenges regarding the lies and blatant evidence of same. This was true in the halls of government, and in the newsrooms. We were all once more easily dismissed; conspiracy theorists are political and social zeroes in government and media circles. That’s why government loves to label dissenters. Pick a label, any label… in a political storm.

Fast Forward a LOT.

TODAY! On the radio today I heard that several NTSB Investigators have come forward and publicly admitted that the official report was doctored, stating flatly it was impossible that the fuel tank was responsible, and that there was indeed (as I had not only been saying, but showing) evidence of missile fire; it was a massive cover up.

What this means to YOU.

It means that conspiracy theorists (the good ones, like me – if you will permit me to so claim) are merely investigators forced to wear a label. It also means that many conspiracies are REAL, and self evident by the conflicting information in the official stories, and the cover up efforts and disinformation which follow. A cover up is itself proof of a conspiracy. You cannot have a cover up unless there is something to cover up, and its existence proves not only the crime is real, but it cannot even be undertaken except by a conspiracy of multiple parties to effect cover up; two interlocking conspiracies in one.

The lesson is: QUESTION GOVERNMENT, they lie. QUESTION THE OFFICIAL LINE, it has holes. QUESTION MEDIA, they are bought.

I urge you to read about Flight 800 at my Web site. There, you will learn things no other investigator has revealed. I was the only one to discover and illustrate the actual fraud in the NTSB Report. I was the first one to identify the ship most likely to have fired the missile (and subsequently visited by a foreign Agent making a death threat on behalf of their country — which should tell you something about the accuracy of my claims).

It will show you how easy it is to pull the wool over a Sheep’s eyes, and make us all into Sheep. It will show you how easy it is to fake it, and to make the public believe an unreal thing. It will reveal how easy it is to have a controlled media. It should leave you with a much greater respect for Truthers, and for conspiracy theorists, in general.

But why should I care, you might well ask? After all, I’m no longer a conspiracy theorist now that my theory has been proven FACT, and the conspiracy proven REAL, right?

WRONG. As long as Mr. Sorento and his crew run government, or others of like mind succeed him, there will be fresh lies to expose, new crimes to investigate. In fact, I’m working on a backlog, because that man and his cronies, like all Globalist Presidents, has more dark plots and evil deeds to dare than one conspiracy theorist, alone, can keep up with. Pray for me!

Care to help me out in other ways? All it takes is to pay attention, ask questions when facts conflict, and challenge government and media when they don’t get it right. And challenge the guy standing next to you when they don’t get it, because Sheeple are a terrible thing to leave running around loose in a Wolve’s playpen. If you ask me, that’s just plain good citizenship.

Or is that yet simply one more way of saying ‘terrorist’ in D.C.? Move along, Citizen, nothing to see here. Move along.

Sorento Secretly Installing Total Surveillance Society


15 Terrabytes of data on every Man, Woman, and Child in the U.S., tracking every trip, call, text, email you make, every URL you visit, every purchase or financial, social, and political action you take, all to profile you so they can predict you and blackmail, jail, or vanish you if it becomes convenient. Welcome to Herr Bush/Clinton/Sorento’s Total Surveillance Corporate Police State.

But wait… I have a simple $7 SOLUTION!

The NSA is secretly establishing the Total Information Awareness Office!

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

This particular post is intended to serve as recap and extended explanation of key concepts covered during a four-hour radio show interview with Clyde Lewis on Ground Zero, Friday, June 7th, 2013.

What you will learn reading this post…

• The nature of a Fascist Corporate Police State as defined largely by cooperative surveillance and spying upon ‘client’ citizens.
• That the National Security Agency (USARMY) is secretly implementing the Total Information Awareness Office under Sorento despite its being banned as unconstitutional by Congress, originally a Bush-Cheney plan;
• The Role of RFID (Radio Frequency Identification Devices) and PROMIS back-door spy software in TIAO;
• That traditional redress of grievances no longer remain a viable remedy TIAO;
• How you can spend just $7 to thwart the $2.7 billion dollar spying operation.

How can seven dollars stop government and corporations from spying on us?

How Fascism defines a Corporate Police State

NWOlogosIn America, there is something called a Social Contract between government and We, the People; the Constitution and Bill of Rights. That document makes We, the People, clients to a government body who we employ to serve our needs for societal functions; to govern and provide for the common good and protection. That is a sacred trust as well as a contractual obligation to government to so perform, and the contract additionally provides mechanisms for redress of grievances when government fails to fulfill its duties properly.

In America, We, the People also enter into financial contracts with all manner of big businesses; banks, phone companies, Internet providers, health care providers, insurance companies, and more. These contracts obligate these firms to provide select services with a certain fiduciary and legal responsibility to adhere to simple, basic guidelines of operational limits with respect to the privacy and security of our personal information entrusted to them.

These limits are essentially the same in scope and detail as those provided for in the Constitution and Bill of Rights, though perhaps spelled out in different terms. We are talking about the right to protect not just the privacy and security of our person, property, and information, but the rights of redress, freedom of speech, and so forth. No contract we have ever signed with any major firm has forfeited these rights or provided firms with any form of blank check to violate them. But that is what has happened…

Both government and most major corporations have grossly violated and betrayed every one of these rights.

How can you spot a corporate police state?

A clue:  when both government and big business act in collusion to violate those rights, and do so under Color of Law (twisting or claiming legal basis, illegally usurping the ‘power’ to violate our rights) — you have a Corporate Police State, a fascist regime.

What defines a corporate police state?

Another clue: When the intelligence community partners with or invests in Google and Facebook (and on and on) and uses their Web technology to spy on you (and in some cases to target you)… when the intelligence community accesses without warrant your email and your phone calls through partnerships with your Internet Service Provider and your telephone company… when banks report to the government your financial transactions and your medical and insurance records are available to Internal Revenue Service-enforced insurance companies… you are in a Corporate Police State, a fascist regime.

what is a corporate police state?

A final clue: when the government seeks to catalog every single activity, transaction, and event in the life of every man, woman, and child, regardless of if related to business, personal, public, or private affairs, and then employs sophisticated methods to psychologically profile and predict the individual, including sexual preferences and ‘practices,’ and saves all such information for use against them should they become ‘politically incorrect…’ you have what is called a total surveillance society, which also defines a Corporate Police State, a fascist regime. Below, we will see that is exactly what is about to take place in a matter of mere weeks.

Welcome to Sorento’s Corporate Police State.

What is a corporate police state?

Why we no longer have redress of grievances in America

In just a few short months of Sorento’s usurping the power of a pre Magna Carta King (claiming for himself the power to murder a citizen or vanish or torture them without due process or explanation under the NDAA), we have learned of an endless onslaught of exactly such proofs of the true nature of our government’s form as reviewed above. Almost daily, we learn our Constitution means nothing, and there is no redress seemingly possible, save perhaps that of armed revolt, always a serious question, but also much easier to effect than imagined. Governments literally make their own gallows.

Our Court System is too costly and slow to reign in Color of Law mechanisms (unconstitutional laws, executive orders, etc.) used to suppress rights; they can write new laws faster than we can challenge them, especially since the offending clauses are buried within innocent legislation. Because our Congress does not even read the Bills it signs, and is so full of subversive New World Order types (members of the Council on Foreign Relations, the Bilderbergers, Trilateral Commission, Skull and Bones, etc., all working to end national sovereignty in favor of a North American Union under one-World leader), we might as well give up on any help, there.

Our elections are a farce, there being no true difference in the hidden agenda of the power brokers of one party or the other, who collectively decide in back rooms who we get to choose from on our ballots in a two-party Dog and Pony Show. We are always offered candidates who are both marketable based on ‘publicly declared’ beliefs and agenda, but who in truth share a true common secret agenda and darker beliefs. We can prove this; the darker policies of Clinton were continued by Bush and then continued yet again by Obama, and yet once more this posting proves it when revealing the TIAO project being secreted within NSA.

Should poor Barry claim yet once more, ‘I didn’t know anything about (NSA=TIAO) until I turned on my TV…’ then he will have no choice but to arrest and try everyone in Command at NSA for treason. No. Instead Congress should be talking about arresting them AND Sorento, and Clinton, and, likely, Bush, Cheney, and Rumsfeld. But fat chance of any of the above, of course, as there IS NO REDRESS remaining in America. The fix is in.

Our media is bought and paid for, owned outright by essentially four corporations made up of more power Elite Boards of Directors and controlling shareholders from the New World Order crowd.  The Internet is slowly but surely being transformed into something ever more friendly to spying, censorship, and corporate/government’s total control. There is an Internet Kill switch in our near future, as well as a tax on every use. However, the Internet is where we will find the seven-dollar cure, thankfully, as disclosed at the end of this Post.

Sorento has ordered 30,000 drones to the skies to spy on us. He is spending up to 5 million per city to fund installation of surveillance cameras, some with microphones. As previously described, he has been working with the top Internet Service providers (e.g., Comcast, Century Link, et. Al) to insure every email and URL visit is accessible to government. He has done the same with every major cell phone carrier to allow access to our calls and text messages. But he was still not done, and now we learn of one final straw designed deliberately to break our backs…

What is Total Information Awareness?

Total Information Awareness is Reborn: Remember the TIAO?

Now we learn one more truth which reveals the full horror of our true predicament: Sorento, in continuation of plans started by Bush, and continued by Clinton, is having NSA (National Security Agency) quietly build a gargantuan secret new surveillance monitoring facility in Utah, and a somewhat smaller one to expand the existing facility at Ft. Mead, Maryland… in order to quietly and illegally implement the Total Information Awareness Office mandate already outlawed by Congressional decree as an unconstitutional, immoral, and intolerable invasion of privacy.

The TIAO was a military concept proposed under former Secretary of Defense (under Bush I) become Vice President (under Bush II), Dick Cheney, and former Secretary of Defense (under Ford and Bush II), Donald Rumsfeld, and former operator of CIA/DOD’s Operation Phoenix (mass assassination program of civilians during Vietnam War), and convicted felon (5 counts of obstruction of justice and lying to Congress about his illegal activities in Iran Contra), John Poindexter, Rear Admiral USN, Ret., and former head of a CIA front involved in health care database management systems.

TIAO was a Defense Advanced Research Project Agency (DARPA) plan to track every ‘transaction’ of every citizen, just as described in the teaser at page top. A transaction is defined, according to the original White Paper and Request for Proposals which I have personally reviewed, as going through doorways, passing before cameras, making a purchase or selling something or any other financial transaction, traveling, undertaking a communication by voice, fax, data, or any other information access or exchange, even to include mail and public libraries. In short, TOTAL INFORMATION AWARENESS.

It managed all this, in part, by backdoor access to corporate databases via directly partnering with businesses or by covert use of PROMIS spy software developed by CIA and embedded at every opportunity within popular commercial database as well as custom written database management software. Since all major corporate Intranets (private corporate Internet-like services) rely upon a telecommunications backplane (PBX phone systems), and because every major maker of PBX equipment includes (by buried legislation) a receptiveness to special signal codes which allow covert remote access by the military, triggering PROMIS infected database back doors is a simple matter.

Note: This fact was confirmed to me directly by a highly placed technical expert working for Lucient Technologies, a major supplier of PBX gear; his explanation as to how government was able to access and effect surveillance of any phone extension or computer within the corporate offices where I was working at the time. He revealed that clients were not to be informed that these backdoors exist.

What is RFID? What are Radio Frequency Identification Devices?

The Role of RFID

Two RFID tags of the smallest kind. paloaltofreepress.com (click)

The ‘secret weapon’ component of TIAO was to be RFID technology, those little Radio Frequency Identification Devices which are currently everywhere: they are in your money ($5 and up – though debunkers claim they are merely polyester strips designed to thwart counterfeiting… but polyester does not explode in a microwave, though it will melt), in most newer credit cards, many drivers licenses, all Passports, shipping labels (and soon, postage stamps), transportation tickets, and almost any product you buy (soon, all products). If you have bought Gillette razor blades, Max Factor make up, Pampers, and any of thousands of other popular items from ink pens to computers from any major retailer, you have RFID all over your home and, likely, on your person.

Cash registers, bank tellers, secure access doorways, turnstiles, security cameras, and just plane hidden sensors anywhere can be modified to scan and learn the unique serial number of an RFID tag (which it reports upon radio command at distances of several hundred feet, and even through walls when special equipment is employed for the purpose). Once a tag is identified with an individual in a database, everything they do while possessing it can be tracked and cataloged. RFID devices are often large (I’ve seen as large as two-inches square in mailing labels) and easy to spot, but they can also be as small as the period at the end of this sentence .

Note: The tracking bioimplant, Digital Angel (aka Mark of the Beast) manufactured and sold by CIA fronts, is nothing more than an RFID tag with Web/Cell phone GPS technology added, a feature common to many RFID chips installed in cell phones (common to most new phones), watches, ink pens, ankle and wrist bracelets, and other devices intended to be tracked. The original part number of the first known RFID application to ‘track inventory’ was a Boeing Aircraft component with the number 666.

In fact, there is an insidious form of it known as Smart Dust, so small they can float in the air, and even be directed up or down on currents of air as if operated by a glider pilot. These (motes) are sometimes placed on persons of interest (one way: ‘air puffer machines’ at Airport security can ‘sniff’ for explosives, or plant smart dust in your hair and clothes). These migrate from person to person in general contact with one another, and permeate anything they might handle and any place they might sit.

Smart dust can do more than track, with select motes capable of sensing (some dedicated thing) and communicating one with another to act with a hive intelligence. This allows them to report information as if a more traditional complex surveillance system, triggered remotely by laser beams perhaps a mile or more distant.

The US Army can and can track RFID at select points along American highways, railways, and some waterways (esp., ferrys, bridges). This is a key tactical component of the Canamex Corridor which will serve as precursor to and lever for the North American Union. Combined with the other ‘transactions’ earlier cited, as well as feeds from security cameras and drones using advanced facial recognition, license plate readers, and other biometric and tracking methods, not to mention the full array of telecommunications signal capture, NSA can process bulk data without human interaction for analysis,  reporting, cataloging and storage, or undertake requested analytical tasks against specific targets, or sift through information to locate or focus on select targets by human analyists.

If you suddenly are deemed politically incorrect sufficient by almost any given person in the chain of command at NSA, the military, FEMA, DHS, FBI, CIA, the White House, or almost any other government power center, you could be quickly psychologically profiled to see what kind of targeting would best reduce you to a social, financial, and political zero, or to predict your every move in case it was felt you needed a visit by Men in Black for ‘special handling.’ That could mean anything from scare tactics to arrest and detention, to torture and vanishing by murder.

That was the TIA as originally envisioned, and it was so horrifying to anyone with an inkling of understanding of words like Constitution, Rights, Freedom, and America, that even our Globalist bought Congress said “NO!” But Bush, Clinton, and now Sorento have blessed covert continuance of the military plan. The new NSA facilities will become at some level, the de facto TIAO without so declaring, according to NSA expert, James Bamford.

This whole affair is especially significant in one way which is quite calculated and extremely dangerous to your family’s future…

What is less obvious but truly significant is that TIAO establishes the only difference between all failed despot-driven tyrannical rule-the-World attempts through history and what is taking place right here, right now in America. Specifically, the technological advances you have just read about might actually let them pull it off. All prior efforts failed because once the people understand their prediciment, they can elect to revolt, and it then becomes a wild-card battle with no way to guarantee victory to the despot. Too many people doing Lord knows what quietly and acting out suddenly without warning.

Once NSA goes online with TIAO, however, within a matter of Months (by this September at soonest), no activist, no gun owner, no politician, no law enforcement official, no judge, no news reporter, no person of wealth, no citizen, and yes, no criminal or terrorist, will be able to make a move without it being documented, analyzed — duly considered and potentially countered with quiet surgical attacks before the move can even be completed.

Yet — will they use this powerful tool to prevent terrorism or criminal acts, the sole basis for justifying the tool in the first place?

NOT ON YOUR LIFE. They will be used ONLY to maintain and tighten political control (why it’s called Political Control Technology of the Military-Police-Politico Force Matrix — as defined by the Revolution in Military Affairs).  They dare not use it for something as unimportant to ‘National Security’ (their definition being security of the people in power) as might be seen in a terror plot on a school or a city, unless it happened to include an attack on the President or someone key to the Power Elite.

To risk doing so would risk revealing the true power and capability of the TIAO tools, and thereby, risk full-scale revolt by those in the Military and Law Enforcement who still understand and obey their Oaths of Office. Besides, every terror or criminal act carried out empowers them to effect more political control; government benefits thereby.

I’ve already personally done more to fight terror attacks in America as a citizen than they ever will be able to claim by using any weapon of Political Control — though Bush took credit for my efforts as if his Administration’s own.

Therefore, NSA, via TIAO, will be able to pick us off one by one as we wake up and start to exhibit politically incorrect thoughts or take actions which do not serve or go along with the interests of those in control; the corporate friendly thugs running a fascist police state for the Globalist agenda.

First they will go for Anon and Anarchists, and you won’t say anything because you are not Anon or an Anarchist. They will next go for Truthers and 99% crowd, and you won’t say anything because you are not one of them, either. Then they will go for the rest of the Activists and Conspiracy Theorists, and you still won’t say anything. Then they will start to go for the investigative writers and newsmen, and lawmen, and politicians who do start to question, and you still won’t say anything, because if they can take them out, what could YOU possibly do.

Finally, when they come for you, no one will be left to say anything on your behalf.

What can we do to stop wholesale spying on citizens?

A simple $7 cure

Only you can prevent Fascism (click)

There are many things you can do. Make clear to your Congressman that you will not tolerate a secret TIAO and demand the NSA be reigned in, and (almost literally) NUKE the project in Utah and Ft. Mead; level it to the ground. Demand reversal of all post 9-11 legislation that deals with ‘terrorism’ by taking away our rights to privacy. Demand the 30,000 drones never reach American skies. Demand an investigation as to who really runs this country with the aim to kick Globalists out of government posts, starting with criminals in the White House and Congress. We need a political purge.

Become politically incorrect, question government, protest as a 99 percenter, Truther, or activist of some useful sort; be a functioning participating citizen! Make yourself heard above the rhetoric of a controlled media.

And one more thing, as I promised…

Spend $7 (or more if you wish) to join NNN OSP, the Nodular Netizen Network Open Source Project to create a 100% citizen-owned-and-operated wireless Internet alternative. Why? Because ONLY citizens make it up, there is no corporate ISP needed and thus no monthly fee. There is no government control or censorship, no government or corporate spying even possible; YOU are the Web!

If just five people join in each neighborhood, it is sufficient to assure its existence and success, creating a communications channel which is beyond NSA’s ability to access. In fact, the ONLY way government can access NNN communications is to go directly to the sender or reciever; the data does not reside anywhere else along the chain, and never passes through a government friendly corporate portal. And, once NNN OSP becomes popular enough, it will also support VOIP with Smart Phones and take away TIAO’s access to voice conversations, as well.

Visit nnnosp.org to learn more.

There are many, many features and benefits not even possible on the WWW. There are even ways the NNN can make you money. Become the Web, TODAY… right this very MINUTE!

Once we have millions of members, the message may just get through… errant governments are superfluous to the Will of the People when they can freely discuss in private what they think about their government (or anything else). They will at last fear us as they should… as our Founding Father’s said it should be. Then, and only then, will they do our bidding, instead of the bidding of the Globalist corporate powers.

Can you afford NOT to spend $7 to thwart the New World Order?

 

FREE WILL: A TIs Greatest Asset, Oft Hardest to Employ


What you believe determines how you react under and are able to defend against targeting. That’s a key reason that targets are psychologically profiled before targeting even begins; the enemy needs to know what chains best to jerk. Turns out, there’s a simple way to jerk back.

Free will: a Tis greatest asset, oft hardest to employ

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What can you do if you are a targeted individual?

What you will learn reading this in-depth post…

  • That belief structures define us, establish our psychology, and our responses to stimuli;
  • There are many ways targeting both takes advantage of and yet alters beliefs to weaken the will to resist;
  • Will power equates to Free Will, the greatest gift of God to Man short of salvation through Christ and life, itself;
  • The pitfalls of targeting psychology as it relates to Free Will, and;
  • How to use Free Will to thwart targeting and run psyops on the perps.

Where do you get help if you are a targeted individual?

Challenge][ As author, lecturer, and consultant on personal privacy and security, and abuse of power, I invite the reader, especially if a Targeted Individual (TI), to make a comparison. Compare the nature and content of this post with the typical posts or emailed materials by other persons offering insight into targeting methods or technology, and/or defensive tactics. Then decide which closer resembles the reality of your experience, and which plays instead to the very fears and results ascribed herein to be unexpected weapons. You become what you believe: let’s take an in-depth and lengthy examination, and see…

 

Is the information offered insightful and helpful, or more likely to lead the victim deeper into the proverbial Rabbit Hole of dread. There is a difference between education and helpful advice through understanding (what a consultant or educator tries to provide), and the rhetoric and trivial dialogs of technospeak or psychobabble offered with questionable veracity, something closer to beliefs and opinions, or even mis- or disintormation than well-sourced facts — regardless of if offered with good intent, or ill.

 

Topic][ We are talking about TI’s, Targeted Individuals, of course; persons harassed endlessly by organized groups using Political Control Technology (PCT), which can mean any number of things from gang stalking to electronic weapons, and much, much more. PCT is military and intelligence community developed technology, so if one is targeted, the perpetrators (‘Perps’) are almost always from those quarters, or from parties with whom they interact, undertaken for political or criminal purposes.

 

We should be grateful, in a way, for PCT. Prior to advances in PCT made since WW II, when a person became a roadblock or threat to a political agenda or criminal plot, they were simply done away with; murdered, typically a ‘wet job’ assassination or, if time allowed, dealt ‘an accident,’ or what we call ‘heart attacked.’ PCT, however, allows a whole new way of dealing with ‘inconvenient’ person who are not quite an immediate threat, thus avoiding the pitfalls of murder investigations and unwanted publicity they entail, and dangerous questions they raise.

 

When the target is a person of wealth and power, or public influence, it is less likely to be used. PCT works best on those unable to afford exotic defenses which would render it near useless, if not completely pointless. Those in the public eye may be too well observed already to risk deployment of useful PCT methods without risking detection by third parties. PCT only works when no one believes it is being used except the target. So unless they can first financially destroy or socially discredit such persons, they may elect instead a good old fashioned murder. Ask Vince Foster, Ron Brown, or even Marilyn Monroe or Princess Di. People with high credulity working for them can’t answer hurtful questions once they are dead.

 

Perps often fear victims][ It is fear that such questions might be answered by the target which drives any consideration for either assassination or PCT. When someone is thus targeted, it can be said they actually fear the target, fear them enough to justify ‘self defense’ and pre-emptive action. Thus the TI may actually hold an ace up their sleeve and simply not know it.

 

Part of my job as consultant is to seek to see if that is the case, identify it, and wield it as offensive weapon.  For such victims, PCT was elected as a preferred method not just because it seems safer, but because of the way it works; the goal of PCT is to render the target into a social, financial, and political zero. No one pays attention to a zero, it is nothing of value to them.

 

This targeting achieves by making the victim seem crazy; no one wants to believe in the Boogeyman, so when they start talking about being targeted, they are presumed paranoiac and/or schizophrenic, and discounted.  Once they achieve this status, of course, neither will anyone believe any information they may offer which caused them to be feared in the first place, even if they have evidence which might otherwise raise eyebrows.  But that does not mean the information has no power over perps, if realized and properly used.

 

Other reasons for targeting][ This is not the only reason for targeting, however. One cannot deploy technology without training users on the methods and devices involved, and that requires live, unwitting subjects. In like manner, one cannot develop devices and improve method without experimenting on human Guinea Pigs. This is all fact, and even found in the Congressional Record (Church and Rockefeller Commission Reports), but for some reason, we still can’t quite believe in the Boogeyman enough to consider the possibility that someone is telling the truth when they complain of targeting. Finally, one can also be targeted for joy riding (psychopathic pleasures) or vendetta — both forms essentially an abuse of power through access to the technology for personal reasons.

 

The reason one is targeted often defines the entire game, including best defense strategy. But that is beyond the scope of this post, and indeed, inappropriate — because every situation, though perhaps similar in generic description to another, will have sufficient variables in play such that strategies should be tailored to the individual circumstance. Environmental, social, and personal matters all come into play, and more.

 

 Why won’t people believe it when someone says they are being targeted?

It gets tricky

Self as a weapon][ The first step in targeting is surveillance from afar and the development of a psychological profile, which is the definitive ‘self.’ The goal is to calculate the victim’s likelihood of being responsive to an array of attack options. It also seeks to uncover some key ‘theme’ for the attack psychology. For some it will be guilt, trying to make the person feel they are targeted because they are bad. Others might come to think the theme is to suicide, or to undertake a specific course of action. It can be almost anything, or it may be completely generic harassment without a theme, because we all different psychological makeups.

 

 

Now, while more than one assault method is available, only one will likely be brought to bear at a time, and fostered until it achieves a certain level of success. I call this a calibration phase. Additional targeting methods are brought on line in a sequence designed such that the success in the former better aids the progress of the next, which in turn ideally augments or reinforces the former. While that is not always the case, doing so is a high-value procedural goal; it is important to achieve as prompt a negative impact on the psyche and behavioral responses as possible, so that responses to attack will be seen as being due mental aberrations — rather than the actions of a Boogeyman.

 

Disbelief as a weapon][ Such disbelief as to true cause by onlookers is, thereby, almost guaranteed. Paranoiac responses (e.g., looking over one’s shoulder to see if being followed) are natural when one is targeted, but do not mean the target is actually paranoid. But they immediately seem paranoid to others, even as the process begins. Yet in time, they wax toward true paranoia, as fear and assault from general targeting starts them to questioning more and more events around them in fears they might be connected to targeting.

 

Soon enough, even innocent things are indeed so judged. It is this same mechanism which renders professional spies less than useful, in time, because they start to over react to their daily dread of discovery. Intelligence agents are, by retirement age, generally speaking, quite paranoid. But there is more such as this, to come. This is not mental illness as some count paranoia to be, but rote conditioning; paranoia by reflexive repetition.

 

Imagination as a weapon][ Part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They seek to create a belief that the problems they face are beyond their ability to resist, and other than they really are. Clearly, any onset of paranoiac beliefs will play to this, and create opportunities to put the ploy into full play. Once achieved, when they fight back defensively, they fight the wrong problem with the wrong solution, further cementing the notion that resistance is futile when the effort fails.

 

This ploy is also used another way; to make them think the wrong people, or at least additional people, are involved, but who are not. Targets are goaded into lashing out, if not verbally, more dangerously, that they might get into trouble, and have key support relationships sabotaged, even face arrest or other legal entanglements — or ideally, be forced into mental evaluation and perhaps even institutionalized ‘for their own protection.’

 

Mistrust as a weapon][ On the flip side of this tactic, they often approach persons close to the victim and attempt to subvert them with lies hoping to induce actual participation. They may present credentials or badges of trust, and talk of child pornography or other criminal behaviors, even terrorism, and sow seeds of mistrust and ‘patriotism.’ Once a victim begins to experience such mistrust, they in turn, feeling betrayed, begin to mistrust others close to them. The net result is that they can never be sure who the players and helpers really are, again fostering whole new paranoiac fears.

 

Fear as a weapon][ The above fears are very effective. Yet some PCT is so fearsome, such as bioimplants, that even suspecting it is in use, heightens paranoia. There are many tricks which can cause victims to assume implants in place, or some other dread, when not true. However, this is more commonly the case with long-term victims who have already been well along the paranoiac response path, and have had their beliefs altered well away from the true nature of their enemy. The longer one is targeted, the closer to this state they tend to become.

 

At such a point, paranoia can naturally grow to the edge of schizophrenia in appearance, perhaps better described as the form of hypochondria in terms of ‘sensing’ symptoms (such as where the implants are thought to be placed, or whatever the dread may be). Fear and imagination, when combined in an unending onslaught, can manufacture new false realities of any construct.

 

Once that transpires, or where implants really are in use, it is almost impossible to work one’s way out. Doctors will refuse to inspect for implants, and X-rays won’t reveal them because they are set for tissue examination, and not dense matter. The latest generation of low-cost implants are indeed fearsome: they are far too easy to place without the user’s knowledge (thought to be an insect bite) while they sleep, are extremely small in many cases, and are designed to bond with and look like bits of flesh if uncovered with scalpal. It takes a good magnifier to see signs of man-made tech.

 Who is responsible for political control technology?

Consequences of false beliefs:

To be a helper first of all and foremost requires no preconceptions of what is true or imagined by the target. For the very reasons described herein (false beliefs), alone. But also because even if truly schizophrenic, that does not mean the person is not ALSO targeted. In point of fact, the class of victim who is a test or training subject is often chosen exactly because they are already schizophrenic; there is no possible way for anyone to believe that they are targeted no matter how badly a trainee or test goes haywire. And paranoia, being natural, is actually closer to a proof of targeting than a reason for disbelief.

 

This is exactly why it is so hard to get good helps from the very people who should help (e.g., Cops, Lawyers, Doctors, Politicians), and why I do not prejudge based on ‘wild’ or implausible claims or implied clues that something is wrong with their facts. If, in the end, if the person is schizophrenic, I’ll eventually come to understand that, and deal with it. If they are ONLY schizophrenic, I’ll by then be in a better position to guide them to the proper psychiatric helps.

 

But also, if schizophrenic and actually targeted, the illness will not deter detection of that truth, nor prevent me from addressing it — though it makes it more difficult. And I will still try to help the victim obtain the helps for the chemical imbalance causing their aberration, as well. And that is all it is. It is not being crazy, and if it did not have such a scary sounding name, people would realize it is not that big of a deal to so suffer.

 

This approach is also critical because it means I can ignore (mostly) any obvious or even inobvious false beliefs held by the victim. They are inconsequential to the true nature of targeting unless I myself also rely on the false facts, but I do not, or at least try not to so rely. Ignorance in this case is bliss. However, at some point, any errors in belief structures must be repaired or, perhaps, tested. It may, for instance, be me who has false perception. A good test can teach whomever is wrong the true nature of things, provided their minds are not sealed to logic (that can be the case).

 

The logical path][ Were I able to go into a TI’s home and install pickproof locks and facilitate true site security, render their computer and phones secure and defeat surveillance devices, make various targeting method tests, set up defenses in response, and do the appropriate investigations and analyze victim history — I can make ALWAYS make progress. It may not be total victory, but if not, the resulting shift will see the targeting closer to an annoyance than a trauma.

 

I’m talking about all the things I advise my client Tis to do, of course, since I cannot do it for them at distance (while I do offer direct intervention, it is generally too costly for a TI to afford, as it usually involves securing other professional specialists or services, as well). This is what I do: play 20 questions, give assignments, some of which are tests to undertake, and figure it out as we go. Repeat as needed.

 

Rationalization as weapon][ But victims tend not to follow my advice even after agreeing, or fail to undertake steps correctly, or misconstrue the results, or even reject the advice or conclusions out of hand — all generally because their current belief structures (as to the nature of the beast) will not allow them to yield fully to my advice or to the possibility of another reality. Their minds are closed to logic, and they rationalize an excuse for the subconscious decision.

 

Strangely, this is often even true when the instruction is a test which would make that very determination. My best successes have only been possible when the victim was relatively new and had as of yet had no such strong false belief structures to struggle with. Long term victims tend to have a ‘been there, done that’ not-going-there again approach even though they haven’t, yet, really (at least not in the manner as prescribed).

 

And understand, I’m not saying I’m always right, by any means. I’m frequently wrong; since I am not there, I must rely on the information I’m given, but it comes from people who are not consistently capable of giving me the correct information— because it is all filtered through their belief structure born of targeting falsehoods. Even if I were on site, I myself might be misled by clues or symptoms, or miss something key, or simply make wrong conclusions. So imagine how much harder it is for the Victim, alone in a stressful environment.

 

Desperation as weapon][ It leads to desperation, and in that state, victims do things they ought not. They almost habitually (mix and match) ‘hook up’ with other Tis, seek sexual encounters with strangers; move into places indefensible, write to authorities in an inappropriate manner, spend serious money on foolish or fraudulent defenses, and more. They rationalize wrong choices via hope instead of choosing carefully with logic, and by that same rationalization, discount failures and thus end up repeating the same error, again.

 

Speaking to my introduction paragraph, they tend to believe at the drop of a hat most any technical or tactical explanation or offer for help (especially if a new or unusual method, and for too many, even if seeming nonsense) — especially if it in any way reinforces a false belief already held. And they tend to reveal too much information when in dialogs, further aiding perps in psychological profile and targeting fine tuning. These things they do in hopes it will somehow at last lead to something that does help.

 

The path unwanted][ All this further exaggerates their false beliefs, and then typically in the end they call those same people (with home they hooked up or from whom they obtained information or helps) Perps when things don’t work out as expected. Regardless, seldom will they toss out the newly acquired fears or beliefs about tech. There is such a desire to ‘understand’ the problem, that they consume and eagerly share information constantly, even if there are logical signposts that it is incorrect. Eyes are raised if anyone dares point out such flaws, and their honest appraisal becomes circumspect. Of course, sometimes, the objections are indeed false, perhaps from a perp.

 

Division as weapon][ Thus in the end, the victim community ends up bickering and fighting and being suspicious of one the other. Even though it is sometimes absolutely true one is a Perp (or just as bad in net result, a true schizophrenic believing themselves a victim), way too many thought to be, are not. For those wrongly accused, help is subsequently even harder to come by, as they tend to isolate themselves defensively. Victims end up torturing victims unwittingly in a mass self-reinforcement of victimization.

 

This is why I no longer participate in group dialogs, polls, petitions, etc.

 

And why was false advice given in the first place? When not because the giver was a perp, it is most likely a false belief structure which allowed the giver to sincerely think it would help, perhaps because they used it in their own targeting. But they failed to realize the perps took steps to make it seem like it helped. This takes us back to the opening statement: part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They giveth and taketh away after it has led to more division in the TI community.

 

How sinister the weapons are][ But even when the advice or information is good, if filtered through false belief structures, it will not be useful to the victim as a rule, and for the reasons cited already. It matters not who is giving the advice; me or a TI, or some third party. False belief structures still get in the way, and perhaps, for some individuals, pride contributes; they do not wish to admit they’ve been wrong all along.

 

I can sometimes make decent progress with a long-term victim suffering false beliefs, but seldom as much progress as desired. Regardless, and this is almost always true for all clients, when even a small level of progress is made, the victim gains strength and the will to continue fighting. They become a Survivor, and are no long victim, and that alone is worthwhile. If I can get that far, there is hope that more progress can be made, and in time, it usually is, but every new gain tends to be hard earned… but with luck, at some point, there is an opportunity to suddenly break away altogether.

 

But you often dare not tell a victim they have false beliefs (as I attempt, here) or a key to truly understanding their problems, even once a survivor, because it will probably be rejected along with other advice. They have to somehow come to realize it on their own, and start from zero; that’s when good advice and helps can actually work. Even then, they must also have the will power remaining to force themselves to stop the bad practices which deter helps and neuter advice, as well as the bad habits born of desperation.

What is political control technology?

But then there is FREE WILL

Free Will, the Survivor’s weapon][ Exercise of Free Will, the gift of God which no other can take away unless freely given in submission, is the greatest weapon a TI has: only if they CHOOSE to allow an attack method to have emotional impact, will it be so. Street theater, V2S (voice to skull), and even pain generating tech becomes little more than a bad joke when one is able to simply decide it has NOTHING TO DO with their ATTITUDE and emotion, or their psychology and philosophical approach to daily life.

 

A Cancer victim in constant pain who CHOOSES to continue to live and enjoy life… such a person in such a state is a wondrous thing to behold, because we see they can be truly happy in life, accepting their fate and enjoying life even MORE than someone uninflected because of it. So why cannot a TI do the same? Only because they CHOOSE to suffer the very psychological effects the targeting pushes them reflexively into. But unlike cancer, there is a cure for that.

 

Never REACT][ Instead STOP, THINK, and consciously ACT; stop yourself from reacting, think what your reflexive instincts were telling you to do — and consider if that was not what was expected of you. With that in mind, then ACT contrary to it in some manner, doing so as if an actor in a play. In the beginning you will have to act like an actor, because it will not seem ‘normal,’ but in time, you will find that things get easier, and eventually, reflexive, such that targeting no longer has any control, not even to force you to stop, think and act. THAT will be true freedom; the day you no longer automatically respond as predicted by your profile — because you have created a whole new profile, one which is targeting resistant, and one they cannot understand or deal with.

 

To me, the real beauty of this method is that it is mind control in reverse; the perps become confused, and are rendered victims of your psychological warfare upon them. The accuracy of their psychological profile is diluted and eventually becomes useless and meaningless. The lack of progress and success causes underlings to get in trouble with superiors on up the line. People get ‘fired’ and replaced.

 

They even start replacing equipment, thinking it defective. And from that fact comes a warning: expect attacks to intensify, either as punative response, or in experimentation to see what’s wrong. But they will not want them to get so intense that they damage tissue or leave other physical evidence, so if you start getting microwave burns, for instance, go to a Doctor and get it documented, and photograph them for evidence, and as always, update your log of targeting events with great detail. They will back off if this starts to happen, almost always. If they do not, let me know. I have thoughts on that, too.

 

 

 

 

I’ve Defrauded and Deluded Myself, I Am Not Me, But I AM


We go through life thinking we know who we are and why we do what we do, but like Actors who start believing they are the sum of their Press Clippings and the heroic characters they play, we are frauds. It took a simple but powerful video to teach me the truth, something I once knew, but lost sight of.

I once was lost, but now am found.

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What you will learn reading this post…

  • I’m a fool, and have been offering knowledge as if expert and wise, when in fact, I fall short;
  • While my advice and opinions are based on truth and logic, I should have offered a better, more useful message;
  • That message does not betray my beliefs and life experiences, but instead, explains them, and gives them meaning;
  • That it should be the same for you as it was for me, if you will but open your heart and consider it;

Whre can I get help when no one believes my story?

A note of apology: a technical glitch with wordpress refuses to let me format the document correctly, making it a little difficult to separate paragraphs. No matter what I do, it displays as intended in preview mode, but not in actual URL access. I regret any inconvenience.

Introspection: the most valuable tool an investigative author could possibly have (examine yourself, first). From heartofaleaer blog (click)

I’m talking about me, H. Michael Sweeney, aka the Professional Paranoid, activist author, and consultant on privacy/security, and abuse of power topics. People come to me for help all the time, and I’ve started to believe in the value of my advice as much as they hope it to be of value in their desperation. Well, my advice may be good some of the time (more often than not, I have always thought, based on feedback), but even so, I’ve not quite been offering the best advice, in the best possible way.

This self examination also translates to my abuse of power issues of which I so frequently write, as everything I tend to blog about is so much in parallel to the basic aspects of things now clearly revealed to me because of simple but powerful video, that I’m hoping those who read my blog posts as activists, will see that parallel as well. It’s not just about me, its about everything in the World and how we deal with it. Let me explain by first going back in time. Some of you who have read my material before may know some of this, but as Paul Harvey used to say, its time “For the rest of the story…”

I doubt you’ve ever had to go up against dirty cops, bounty hunters, and CIA/FBI types, some of whom wanted to kill you (e.g., gun in folded newspaper, sniper’s nest carved out of branches high in a hillside tree outside your bedroom window through which came a targeting laser at night, being chased by up to eight cars in a high speed chases). This is the kind of high adventure we all enjoy seeing in action movies and television, but its an entirely different perspective when you are the hopeful hero, and your opponents are not acting under legal authority, and there is no acting, but actual intent to harm.
I’m rather certain that you, as lone individual, could not well square off against an enemy that has dozens of players to help them, such that their war against you as their target unfolds 24/7, but you are only able to devote but a few hours of tactics each day. More so the problem when they have an unlimited budget and the best technical toys money can buy — and you have only what you own around the home, and a modest income and savings, which they also target and erode.
I doubt you have ever had to come home to find men with walkie-talkies fleeing your house, or find it had been broken into and every computer and every disk in the house upon which could be stored data, even those secreted away in storage areas, had been stolen — or discover that the neighbor across the street, a Forward Marine Observer retired for wounds acquired in service in Iraq, upon returning home across the street with his Mother… was, as casually and (unwisely) revealed in bragging by his Mother, approached by CIA Agents who asked him to work for them… and later, learning from a professional investigator retired from the State Police in another state that Infrared Night Goggle vision surveillance of your home was being conducted from that neighbor’s home, and further confirmed that all phones in your home and select other devices were ‘bugged’.
I doubt you’ve had your mail regularly pilfered, learning time and again that people trying to reach your home-based business had sent you mail you never received, some of it being orders for product, and like interference of inbound telephone calls where your phone is never answered, when at your end, it never rang at all, or that harassment telephone calls to family at all hours, and other calls known to be from your opponents — magically did not appear on telephone company call records. I doubt you’ve ever had the Consulate in another country literally beg you to provide them with copies of your business Newsletter to distribute to potential clients, only to then have the U.S. State Department suddenly, out of the blue, declare your Newsletter ‘Illegal’ under the laws in that country, but refusing to cite the law, or answer further questions.
I doubt you’ve had to suffer nightly assaults on your home, attempted break ins within moments of retiring for the night… night after night. Or, upon calling the Police, have them ignore evidence offered of the break in, ignore the fact that your spouse agreed with your descriptions of events, and instead elected in their Police Report to say only things which made the whole affair seem imagined, implying you a Paranoidal Schizophrenic, even suggesting County Mental Health should be contacted.
Imagine how you would feel, realizing it odd that this Officer responded within mere seconds of dialing 9-11, and later, would try to kill you. Such events, for me, were one reason I based the title theme of my first book upon the topic of Paranoia; for I quickly learned that someone who reports such things is quickly labeled paranoid, because no one wants to believe in the Boogyman, least of all people who are part of the System from within which he seems to come.
Ergo, there was no one to turn to for help. No authorities would listen. Even friends and relatives find such stories hard to believe, and tend turn away with denial of any truly useful help. And yet help came.
And even when it was clearly the help of other Men, it was also clear their help originated from God, typically quite unexpected and coincidental, or a highly unlikely source, such as a total stranger offering $250 and saying, “Something tells me you need this more than I do,” at a time when I was trying to find a way to afford a high quality audio tape recording system as defensive tool. And when things seemed bleakest, an old competitor in a prior business called me up  after ten years of no contact, and offered me a significant position in a new business enterprise, one which would lead to more such helps in time, and become a safe haven of sorts.
I lived such a life for nearly five years, and in almost EVERY battle, enjoyed victory, or was at least protected from more serious losses than intended. The James Bondian nightmare was at long last ended by literally discovering the truth about why I was targeted. I had, it seems, accidentally learned of illegal crimes which they feared I might expose. They wanted to know what I really knew, who else knew, and who was ‘helping me’ to best them, that they might destroy us all and be safe. But there were none others, not any they could find or believe existent.
They could not believe me acting alone, because time and again I detected those who covertly worked against me and exposed them such that they were embarrassed to their superiors, and set aside for someone I could not recognize on sight, next time. I eventually identified every player, where they lived and worked, and discovered the truth of their varied criminal enterprises, and those dark things they were hoping to protect by targeting me. In short, they themsleves led me to understand the very thing they feared: knowledge of their sins.
Phone numbers, license plates, public and, in some cases, private records, etc., were gained on key persons and firms not just locally, but nationally, all the way to Washington, D.C. and beyond. I even had covert White House, NSA, World Bank, and like phone numbers before it was said and done, and access to logbooks within Federal offices and even entire roll-a-dex and index card systems from the desk of one of my main opponent’s managers. And I never had to violate a law to do it. God was my key to their secretive locks.
I even managed frequent access to their innermost places without detection. I laugh, recalling walking into one of their covert offices, and the man seated there, a recognized opponent, falling out of his chair to the floor in surprise! In another example, a truly high-security area was discovered in a way that caused three people encountered there to scurry from my eyesight like cockroaches, placing folders to their faces, doing about faces, closing doors, and so forth. Evil cannot hide its face quickly enough, it seems.
I think their disbelief was largely because they also did not believe in God. Why I so believe is the where we are headed in the telling.
In the end, I won the war, thought the net cost to me was personally quite high. Forced into bankruptcy, forced to sell our wonderful hillside dream home, loss of the very computers used in my work and an insurance claim thwarted by enemy tactics so they could not be replaced, a foster daughter who asked to be taken out of our home because she did not feel safe, and in time, severe blows to the bonds between other family members. I rank my financial loss at about a quarter million, but it appears they spent that much to destroy me in a single month. Their money bought them little, diluted by God, as were their endless man-hours of effort against me.
It’s absolutely true. In the end, I indeed did win, but not of my own cleverness or determination. I had reluctantly entered into that battle with no special skills or training of their caliber, and throughout the battle had no weapons as they might count weapons. Yet from the very first day of their presence in my life, almost every skirmish of true importance would be mine. It was, at times, turning out to be such a comedy of errors to my favor, that it literally became fun to do battle.
All this I did, and yet, not I. There was indeed another.
You see, my chief weapons were mere words, and a belief in Good over Evil. The words were the Word of God, and were the heart and meat of Good, as well as other core beliefs, and an abiding Faith. I was only a few years earlier caught up in a cult, and knew not what I believed, and understood not the truth of God and Man, and Satan’s role in my life. And yet I was saved, and I grew daily in the Word such that the Truth was at last mine, and I was set FREE! So free, in fact, that NO MAN, no matter their abilities and resources, could truly harm me without God’s permission. That belief was my armor against all-powerful opponents and impossible odds of survival.
It was proven almost daily each and every year of battle. Also provided for during the darkest of financial threats fostered by my enemy, was our daily bread. A source of income sufficient, sometimes even exactly equal to the cost of minimal foodstuffs required for the day — would become available that day, or the day before — or at other times, it might be on a weekly or other basis. Other magical moments also addressed such needs in ways not involving money, at all. We lived by Matthew 6:25-27, alone for long periods of time.
That’s all behind me now by more than a decade, and though I have written seven books which generally assault the face of my old enemy and his newer counterparts, those responsible for dark bumps in the night of recent American history, my opponents largely leave me alone, now. The worst I’ve gotten is hate mail from a sitting President for exposing ties to CIA for both him and his wife. I’m still protected by what I learned, and they fear me, or more correctly, what I know and might reveal if harmed.
What a shame that any citizen of any land should need to blackmail their way to safety. But I traded one dark set of secrets which I keep safe, to keep me and family safe, and to allow me to now speak openly of other things without reprisal. It became the basis of a new livelihood as activist author, lecturer, and consultant on privacy and security, and abuse of power. It redefined me and gave me new purpose, to help others who have been called ‘paranoid,’ but who are not, people who can get help no where else.
What can we learn by humbling ourselves?

The Revelation

And so, in sensing a kind of invulnerability, I find myself becoming, like many Hollywood actors, a little bit too self assured. Like them, I now realize, I’ve started to believe my own public image; a false perception. I am not the hero of my life people presume by the outcome of exploits, and certainly not the Knight who comes to save them from Men in Black or other dark threats.
I am nothing without God, can do nothing without Him. Oh, sure, I give little credits to Faith and quotes of scripture when I hand out advice and recount my victories, but in my innermost view of self, I’ve wandered from full reliance upon the true power of the Word, and become conceited as if I really were a mighty warrior, wisened and ever alert, that person my enemies imagined me to be.
I had fallen back asleep, succumbed by the misty aura of public attention and pleas for help, a kind of sad fan mail. I have become pretender, forgetful of things learned of great value.
Today, however, one of the ‘sheep’ who comes to me seeking help reminded me of one of my own slogans, something I used to employ when I was an instructor. I used to say, that one reason I liked to teach was, that no matter how much one knew as a teacher, and how little a student might know, if the teacher did their job right, both would learn something from one another. This young woman, now experiencing targeting somewhat like my own, in seeking me out from afar to ask advice, helped knock me off my pedestal of self promotion, and bring me back to Earth in a grounded way. She reawakened me, and taught me that which I had forgotten.
She sent me a simple but very powerful video, thinking I would like it because, as I tell all my clients, you must “Put on the Armor of God,” to be victorious against evil; Ephesians 6:10-18.
Well, I must tell you I was completely unprepared, and the video was indeed irresistible, and it was VERY powerful. Though I was pressed for time, I took the time, and watched it not once, but three times. Every time I got to the part which actually involved Putting on the Armor of God, I broke into tears. Even so now just writing of it, this very moment, my eyes water in remembrance.
You see, in the video, the truth was graphically shown. It was not ME… IT NEVER WAS. It could not possibly be me, nor even YOU, no matter your true strength or resources… IT CAN NEVER BE.
WE do not put on the Armor of God, or do any of the things we think we do in Christ’s name. Nor, for the matter, can we do anything to be saved in the first place. It is HE who does the work. He calls us to salvation. He works in our hearts to draw us unto him, and redemption. He then arms us with what we need to do battle. The only thing he asks us to do, is to be willing to do battle, a willingness born of belief in Him and his Word, and out of love for Him and his Word.
He asks only that we allow him to enter into us to be our inner strength of body and mind, and to cloth us with his white raiments that we are Justifed and pure, enfolded in his Grace, the impenetrable and almighty Armor of God. His Holy Spirit fills us, and thus filled, our sinful nature yields, and is fled.
But as I have learned from my young friend and her thoughtfully provided video. We slip. We forget. We build up the sinful Man yet again, and again, bits at a time, and even in leaps and bounds. But the beauty of God’s Armor is that it is not tarnished, but renewed and polished. All it takes for this renewal is to once more acknowledge the Word, and truly contemplate it, embrace it, believe it, and most of all, LIVE IT, once more.
Forgive the length of this missive. A writer cannot stop typing so easily as to simply say, ‘Please watch this video.’ I’m going to watch it every morning for a week, and I’m betting I will have one of the best weeks of my life doing so. Join me, please, and remember from whence life and Free Will comes. Why would we ever choose to live a life without acknowledging and honoring the source of it?
Know also, if you click the Youtube user’s link you will find more videos of such quality and Meat as this, from someone previously unknown to me, the Ellerslie Mission Society  who has a Website where the same videos, and more such bounty is found.
Pleas consider to share, reblog, etc. It is more important and valuable than any other helps or advice I’ve ever given elsewhere in my books, Web offerings, radio interviews, and consultancy, etc.
For I am not that I think I am; I become what truly I AM when the Holy Spirit works through me.
I AM, for those who don’t quite get my drift, is the actual name of God given to Moses. You can do nothing except by IAM, because every small thing you do is, in your mind, preceded with the thought… “I am going to change the channel… get a drink of water… go to bed, etc.”  Acts born of evil temptation, on the other hand, start with conclusive edicts “Grab it while no one is looking… kill him… make up a lie, etc.”
But these are mere suggestions introduced by Satan, and have no power at all except by the individual’s own Free Will, which is also God’s gift to use. That’s what it means when you forecast an act; “I will call you tomorrow,” is you stating you Will it should be so, doing so FREELY. Why would we ever choose to use it for anything but right-use-ness?
I will be better in serving you in future blogs, more mindful of who I AM, really. Our battles with the New World Order as a group, We the People, and micro battles between targeted individuals with Men in Black… these are no different than Christ vs. Satan on the Day of Armedgeddon, or lesser battles, such as a small boy tempted to steal a piece of candy. In all such cases, if those on the side of Good fight wearing the Armor of God, they will prevail. We do ourselves and our cause disservice when we forget that point and fight purely with our own strength in bitterness.
Forgive my bitterness. It was born of forgetfulness.

Monsanto Protection Act Lights Fuse of Armed Insurrection


Self Defense is the right of all Men regardless of any Law. When an illegal law deems to both make redress and self defense illegal, many will see it as time for a revolution. The Monsanto are coming. To Arms! To Arms!
 
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
Will Monsanto GMO spark a revolution?

Reading this post and its links, you will learn…

 
• Things so terrible that I will not bullet list them, lest you flee this page in fear of dark things;
• Things which may mean life or death to you, your family, and America as you know it;
• Things which, in the best of outcomes will undoubtedly mean thousands of lives taken by violence and/or a biowar intending depopulation.
Why does Monsanto have its own Police Force?

They keep perfecting mass murder. (click) From an interesting beforeitsnews.com piece

Many of us ‘prepers’ and ‘conspiracy buffs’  have warned for some time that government wants a showdown with YOU in their gunsights. Now we start to see proof there is a price to be paid for failing to heed, for those not prepared to face what apathy and inaction leads us all toward at speed. Got Bushmaster? No? Gave it up to Feinstan, Bloomberg, Sorento, et. al? Better put your affairs in order, then.

This latest tyrannical atrocity, The Farmer Assurance Provision Act of 2013, also dubbed the Monsanto Protection Act to reflect fascist provisions burried deep within it, is one line in the sand many will not likely let be crossed without a gunfight, or similar violence. Understand this: a fuse has been lit, and while the length of its burn is not known, the bang at the end could very well turn into a repeat of 1776.

Frankly, I don’t know whether to pray it does, or does not; it’s THAT SERIOUS a line in the sand, to me.

But it is not my opinion which matters as much as does YOURS. But do you even have one? If you do not, or don’t even know of and understand the nature of the threat from GMO corn, soy, and other bioengineered seed programs, and matters closely related, you will be happy to know Mother nature has a special place for you. It is called survival of the fittest, and destruction of the weakest, you being the latter in the equation; those who die from eating genocidal foods, a very real possibility in almost any proper review of facts.

We are talking about crops genetically modified to have built-in pesticide powers based on Monsanto’s Roundup, a known poisonous substance, and other ‘properties’ which make it even more dangerous. The Act gives Monsanto the power of life and death decisions with zero responsibility (impunity), and takes away the ONE THING which is designed by our Forefathers to PREVENT armed revolution; the means of the People to seek redress of grievances with government through the courts.

OK, then, if that’s how they want it… get ready to ‘pass the ammunition,’ instead.

Because why? Because there is so much resistance to labeling such foods at every turn, and because they are used to feed animals you eat in other foods, there is no way currently to avoid eating them, or know if you are or are not, save perhaps eating only organic produce. Even then, contamination is not impossible. The only solution left would be to stop Monsanto and friends DEAD in their tracks, and unfortunately, it appears they wish for force matters such that the only option available for us to do so may be to seek it in literal terms.

We would rather it be figurative. But if YOU otherwise make no collective effort to stop them peacefully, you will deserve your fate for being a dumbed-downed mind-controlled Sheeple. Your apathy and non participation will be causal to any escalation toward violence forced on those unable to make headway peacefully. Their failure will be because of your lack of support.

If you don’t get that, stop reading this until you’ve visited Oz to find some brain matter to replace the straw in your head. It’s all over the Internet, and from many, many viable sources (even the disinformation deliberately put out as a straw man tactic is based on ‘kernels’ of fearsome truth — and efforts to debunk this particular ‘conspiracy theory’ themselves lack credibility and tend to follow the 25 Rules of Disinformation, such as employing straw men, vanishing evidence, and so forth).

Is self defense justified if GMO threatens the lives of you and your family?

Things to know for your survival:

GMO is tied to the Doomsday Vault, Agenda 21, Codex Alimentarius, depopulation

Doomsday Vault, Agenda 21, Codex Alimentarius, = depopulation

If the above still does not convince you, ask yourself why GMO crop makers, Bill Gates, and Rockefeller have funded, along with Bilderberger leaders, a ‘Doomsday Seed Vault’ protected by the highest of security on a private Island in frozen wastelands owned by a Bilderberger. There, non GMO seeds are being stored for some future use, accessible ONLY by the Globalist Elite — while at the same time we see from the above that these same people are taking steps to insure non GMO seed cannot even be purchased, much less used, without violating law. We are talking about billionaires who have private chefs, often having them travel with them on trips, and NEVER eat anything we eat, except on a rare lark.

Part of that story requires us to add to this complex mix of topics some equally scary things outside of, but tangent to GMO: Agenda 21 and Codex Alimentarius, for instance, and the concept of depopulation, long a known goal of Globalists to reduce us to a half million souls. Consider all these things collectively, and you realize that violence may be the only recourse, sooner or later, unless we can unify and find a quick way to avoid it. But the fuse, having been lit, makes sooner more urgent, and later less tenable.

Now, Sorento and Congress show their true colors as traitors to all Americans and the American way of life… even life itself, in fact, the hallmark of Satanic thinking in the Illuminati Plan to create a one-World government that they might seat the Antichrist. It’s O.K. if you don’t want to subscribe to that ‘theory,’ but I’ve written books with over 1,500 footnotes to make that very case.

But it is just a Congressional Bill we are talking about, and, after all, Congressmen will simply excuse themselves, saying they ‘didn’t read the Bill’ before they voted it. Sorry, but if things erupt with violence (and to a lesser degree if it does not), they will still be held accountable if they voted for it, as will the Great Pretender who signed it. Consider the full measure of risk they undertake by their crime against humanity, which is also treasonous. There can be no greater penalty than those common in such crimes, especially if during a war (revolution).

And for the matter, therein (Sorento’s signature) lies the problem for Monsanto. Even if Monsanto is not razed to the ground by angry citizens… even if their poisonous ‘product,’  which is nothing more than a tool designed to give them a global monopoly on farming and to depopulate the World with a soft kill is not destroyed in grain stores and warehouses before it is planted… even if they survive attacks against them and their evil seed… the Act does not afford the protection they presume by its signing into ‘law’. It is a fictional belief… not Law at all, but a fictional ‘law’ which is at best temporarily useful while government pretends it legitimate.

Any Bill signed by Mr. Sorento under a false identity will eventually be ruled null and void as will be all ‘law’ of the last four plus years of his charade; his pretense cannot long last, even if it requires a number of years after his final term in office expires to force the Courts to admit it. He has no power, and neither does anything he signs. There has been zero Law enacted since he took Office. He, and all who helped in the charade will be jailed or worse, and of no power whatsoever to help Monsanto (Oh, happy day!)

There will be no protections if the ‘law’ thought affording them was found illegal. Nor if collusion between Monsanto and politicians writing the Bill, and the White House are established as criminal in nature (as is already seeming to be the case in the links above). Even if the Courts were so foolish as to overlook such reasons for nullification, perhaps due to bribes or threats, or the influence of Clarence Thomas, the court of Public Opinion and a little thing called self defense will still afford a final ruling which will be enforced.

Can self defense ever be peaceful?

PEOPLE HAVE THE RIGHT TO DEFEND THEMSELVES FROM HARM

This ACT, I fear, is the final spark which has at last lit a fuse which cannot easily be put out; a fuse leading to armed insurrection. I’ve tried to warn government and citizens in my earlier posts that every time politicians elect a criminal or unconstitutional choice, they put a gun to their own heads in a game of Russian Roulette, a game which decides if armed revolt breaks out.

Given the levels of frustration that I feel in this matter, I can only imagine how famers feel, and picture them raiding grain stores and destroying Monsanto product wholesale, if not marching on Monsanto properties with guns and torches to level them and drag corporate bosses into the streets. I fear hanging in effigy may not be seen sufficient. Hopefully I am wrong, and mere alarmist. But if I thought it would actually end the matter usefully, I’d be tempted myself. But would it be useful, really?

I wonder. I wonder because I also fear this is exactly the situation intended by Globalist leaders who seem to control our government. I fear it why DHS has placed bid requests for 1.4 billion rounds of munitions, including 9 million sniper rounds, none of it for normal military operations. In fact, I fear it related to a long list of other curious purchases and moves by government over the last few years, especially those since Sorento took office.

They collectively point to an intent to light such a fuse, I fear. Such pointers include, for instance, a steady stream of military mock raids on American cities with armed helicopters discharging gattling guns, soldiers repelling from or landed from the choppers to blow the doors off of buildings and engage in combat with ‘resistance,’ of some imagined sort.

Who will stop GMO crops from killing you or your family?

WE ARE THAT RESISTANCE

Confrontation is exactly what I and many others have feared all along was intended at some point in the future, and now, with the Act — it seems absolutely unavoidable and on the near horizon. Now that they see they cannot arrange to ban guns which approximate military grade, thereby effecting a de facto gun seizure, indications are now that they are going to instead foment a wave of violence in the heartlands and cities to justify labeling gun owners as a threat to national security, and come after them by force.

I even worry they may even foment that violence themselves and blame it on us (false flag operations) to justify their heavy hand to passive onlookers, the Sheeple at large. For this Act will undoubtedly result in such outrage and frustration as to move those most concerned to violence, even if it takes some entrapment or priming of the pump of anger and concern. If not shooting, then arson or bombing, from which must eventually evolve shooting by on side or the other. The fuse has been lit.

While there are only a few million rural persons who’s livelihoods still depend on farming success, almost all are quite well armed. There are tens of millions more who truly understand GMA enough to side with Farmers, a large number of them also armed, and some number of them are surely angry enough to say, “Pass the ammunition!”

But even if only 1% of farmers dared take a militant stand and resist with forceful action to protect their way of life, and the lives of all us… to save us from domination and ruination by Monsanto and a truly insane and clearly fascist government (defined, in part, as a government which makes oppressive laws to the benefit of corporate profits and the power elite to the detriment of the citizens)… even 1/tenth that number is  more than enough people to start a full-scale armed revolution (statistically proven through history).

The mechanics of revolution, as I have pointed out in above linked post, clearly require only two things: a handful of angry people willing to do something which cannot be ignored by government, something which is seen to strike a blow for freedom; and a government willing to use a heavy hand to quash them for their trouble. In every instance, instead of quashing them, they make martyrs and fuel the anger in those previously asleep in their inaction. As result, those who survived the start of matters are joined by many millions more, and a full-scale revolution is born. “Pass the ammunition!”

This time, I fear government has indeed gone to far, and I urge everyone who is angered and moved to action to please stop, think, and act responsibly. Do not react carelessly out of emotion. Violence on your part is likely expected, and desired. Do not give in. Instead, organize and resist in every legal way you can muster (there are ways to do that). As part of the protest, I beg you make clear, as this post attempts to warn, that escalation will be the consequence of inaction by government and the criminal corporations.

They must be shown we will not let them continue to consider humans as mere objects they may move about on a financial and political chessboards, and knock off the board as pawns to suffer death or a life of misery or servitude. We will not idly stand by and let them win the game in which only they, Globalists all, deem to be onlyplayers with any chance at winning. We pawns must become our own self-guided army, and change the rule of the game so that we… we mere avatars of their avarice, are the ones who win.

How can GMO crops be stopped?

WE DARE NOT LET THE GAME CONTINUE AS IS

The fuse is lit. Who will help extinguish it by right action? Who will fan it to burn faster? Only YOU can decide. YOU are what you’ve been waiting for. Either way, I’m looking forward to ruining their game. But I can do nothing without YOU, be it words or bullets that eventually do the talking.

Enough talking. It’s all made me hungry. Let’s get something to eat…

On second thought, I’m not so sure there’s anything good to eat any more. Perhaps I’ll just share this post with some friends, instead, and start a dialog about what we might be able to do change that little problem.

What can we do to stop Monsanto madness?\\\\\\\\\\\

Related articles

Fiction of Future Fact? 23 Families Jailed, Loose Their Homes in Weekend Raid


Is it mere fiction (from book, Fatal Rebirth), or your future reality? Don’t be so sure you know the answer, because smaller scale events like it have already happened.

What will happen if martial law is declared?

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
 

Actual MJTF suburban raid. The crime? Selling unpasturized milk through a Farm Coop, an Agenda 21 crime established as result of United Nations and Globalist mandates through Bush/Clinton/Obama admins.

From Fatal Rebirth, by this author; proparanoidpress: a fictional account of crimes of the New World Order from 1947 into the future, with over 1,500 footnotes so you may decide how much of it really is fiction, vs. reality in play. Based on the Unified Conspiracy Theory developed in a ten-year research for the book, it has correctly predicted political assassination efforts to effect control of the US election process, the downing of the WTC by passenger jets and resulting Middle East oil wars, and more. It also led to the author’s direct intervention in and prevention of one, and possibly two terror attacks on Portland, Oregon.

 
A FREE copy of the ebook (Vol. I of four volumes) is available for the asking. For more information, special pricing, go here
Why are Bloods and Crips Gang members being given Police badges?

23 Families Jailed, Loose Their Homes in Weekend Raids

A local news clipping (a sub chapter in Fatal Rebirth, Vol. III)

Police struck another blow against continued political and social unrest this weekend when they arrested 31 adults and took another 58 men, women, and children into protective custody in a series of surprise predawn raids ordered by Homeland Security. The actions were part of a continuing series of such raids across the nation undertaken in increasing numbers under authority of blanket bench warrants issued by the new FEMA Court System, a concept adapted from and empowered by provisions of the Patriot Acts and subsequent legislations.

The Multi Jurisdictional Task Force (MJTF) raids regularly involve elements of the National Guard, State, County, and local Police, and special Community Active in Policing Services (CAPS) deputized citizens as well as the usual Federal advisors, undercover operatives, and observers from DHS, FEMA, FINCEN, FBI, DEA, DIA, BATF, IRS, CIA, and numerous unidentified agencies.

Each Agency representative determines if arrestees were in violation of pertinent Federal laws or if there is any reason to suspect militia or terrorists activity or support. This time, the blanket bench warrants were served on the Corbin neighborhood where some 600 homes were searched Saturday and Sunday after roadblocks cordoned the area. There was little formal resistance from most law-abiding citizens, many of whom were given temporary shelter from the cold in the several motor homes set up for preliminary resident interviews. Coffee and hot chocolate was served by representatives of the Red Cross, who also provided blankets to those insisting on watching their homes being searched from the sidewalks.

However, gunfire punctuated several intense confrontations between agents and a few persons believed to be criminals or underground members of or sympathizers with the Constitutional Army of Repatriotization (CAR). However, these resulted in only minor casualties on both sides, and the Cobra gunship helicopters and heavy-machine-gun-mounted vehicles were not called into play as have been reported the case several times earlier this week in Detroit.

The statistics locally to date since declaration of Martial Law three weeks ago now stands at least 115 dead and 321 hospitalized, 7 of those injuries and two deaths being CAPS members and one DEA officer injured. At least 1,890 persons have been detained for questioning or actually arrested. The majority of deaths and detentions of non Islamics are attributed to armed resistors, presumably militia or criminal elements or supporters, or discoveries of significant contraband. Readers are reminded that possession of antigovernment literature is grounds for detention and questioning about loyalties and activities. The bulk of detainees are, however, apparently of Middle East origin, though no precise numbers are available.

Agencies conducting the raid were looking for weapons not already turned in during the amnesty period earlier this year, as well as illicit drugs, hoarding of food and fuels, proper travel documents and proof of citizenship, extremist and cultist materials, pornography and other contraband. Most of those taken into custody were taken immediately by helicopter to unspecified out-of-state Federal facilities for interrogation and possible ongoing detention.

Under recent revisions in the law in support of Martial Law, any charges resulting from the raids will be submitted to the temporary FEMA/FINCEN Court system operated under the US Army’s Judge Advocate system (military tribunal) for summary convictions instead of wasting time and money with the traditional drawn-out trial processes. If ruled guilty, their homes, vehicles, and personal properties will become the property of the State under forfeiture laws, with some of the goods to be distributed to the CAPS program managers for community enhancement. Most trials are in absentia with the defendants participating only by affidavit.

Elsewhere, Stevie Wilson, former member of the Bloods gang and acting spokesperson for the CAPS program described the raid as “rewarding in many ways,” and thanked the Police for giving them greater latitude in conducting searches… “It’s a lot easier for us to find contraband now that we don’t have all the procedural red tape that forced the Cops to oversee our every action directly.” Police discounted the usual charges made by those arrested that the former gang members had planted evidence and were only interested in confiscating goods they themselves would get to keep… “These charges are easy to make, but hard to prove. They can’t get out of it that easily.” offered an unnamed law enforcement official who, like many of the special agents, needed to protect his identity by wearing a black Ninja-style hood.

In a related matter, Mrs. Ira Johnson, wife of well-known newscaster Dave Johnson, has formed a new organization of housewives whose purpose is to help the progress of the searches proceed as smoothly as possible. The organization, called WELCOME, will urge all housewives to make their homes as easy to search as possible by using as much table space and floor space beneath tables and adjacent to furniture as may be possible to array items from within drawers and boxes, especially breakables, important papers, and valuables, to prevent damage and reduce cleanup afterwards. These steps, as well as placing the empty drawers on edge against the wall will dramatically speed search process. The organization also advises wives to urge their husbands to destroy objectionable and illegal materials in advance of searches for the sake and safety of the whole family, and to avoid embarrassing questions. See related story on page 6, Objectionable Materials List Broadened to Include Many Men’s Magazines. Raids will continue unannounced for several months until all areas have been searched at least once according to a FINCEN press release. At that time a special panel will convene to determine if further searches or other measures may be necessary.

Author’s closing comment: Is the above a future headline story? If you think not, reason out the visible signs. A small-scale version of this event has already taken place and is frighteningly close to that described, here. Such events are proofs which contravene arguments that ‘gun toters’ clinging to the ‘old fashioned’ ideas of the 2nd Amendment are ‘paranoid.’ Those so claiming are either blind to the truth of our times, or are working deceitfully for the very conspiratorial NWO agenda they pretend non existent. Even unfettered paranoia has a root cause in the real World, but they would deny that fact and have you think such fears imagined. 
 
The right to bear arms alone is the guarantee of all other rights, for as surely as absolute power corrupts absolutely, power without opposition grows oppressive. As intended by our wise forefathers, the 2nd Amendment serves as a check that our Government does not become too powerful and intrusive into our lives. Only when citizens are armed with weapons of like ability as the military and Police, does government fully understand that theirs is not the ultimate authority — that the people are their true commanders. Yet our politicians seek so-called gun control in the name of reducing crime and violence. Is that their true motivation? Do they achieve that which they claim as an end?
 
At the best, they merely address the emotion behind a desire for less violence — a desire fostered by a media-fueled notion that violence is on the increase while, in fact, a steady stream of statistics from FBI demonstrates it is on the decline. They seek in illusion to prohibit assault weapons which in fact account for a minuscule fraction of a percentile of all gun violence, while in reality depriving the citizen of the very arms required to make viable the 2nd Amendment. They seek in illusion to force criminal background checks at places where in fact, citizens buy guns, but criminals do not, while in reality providing a lists of citizens who own guns — the ultimate tool in seizing of power. These are not logical or viable actions, but rather, cover stories for covert actions against gun owners. Something beyond concern over violence is at work here. 
 
And a note on CAPS. As crazy as it sounds, such programs have already been experimented with in Houston and Los Angeles. Actual Crips and Bloods get Policd training, and a badge, and in some cases, were authorized to carry a gun and participate in Police activities, or become part of the Reserves. You used to be able to find information on the Web about it, but not for some time, now. It is documented in Fatal Rebirth.
 
And a final note on Internet censorship. If you do not believe Google, Bing, and the big corporate Web players are part of a conspiracy favorable to tyranny’s Agenda, try this: use your favorite search engine to TRY to find pictures of ANY MJTF raid. MJTF is a very well known acronym for Multi-Jurisdictional Task Force, and MJTF raids of all manner happen all the time 

1776 2.0 Cometh: What Price Treason, and Who Pays?


Gun Control Laws and other Constitutional/Bill of Rights erosions by government are TREASON. Ultimately, YOU decide who is going to pay, and how.

1776 2.0 Cometh
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
Compare 1776 to 2012 and tell me where you live

What is the price of treason, and who pays?

Historically, the price of Treason can be unbearably high. If caught and convicted, the price can be as high as death, typically by hanging or by firing squad. In time of war, especially, and if that war be a revolution to throw off a tyranny born of such treason, the death penalty is more oft employed. Therefore, only a fool undertakes treason lightly; those who accept such risk must have great personal gains as their motive, else why the gamble?

But the cost is also high if such tyranny is not overthrown. If one is subservient to it without protest, or resistance is beaten down by it, the cost is loss of all Freedom, and often, again… the loss of life itself. For when government gives unto itself absolute power, it is corrupted absolutely, and free to deem any person at will as unworthy of life simply because they are seen as an inconvenience to whatever drives their tyrannical agenda. Yes. An example is called for:

Today, the person acting as President, through the NDAA Act, has, in conspiracy with those who voted for the Bill, usurped the power to take life and liberty with just a word; the tyrannical power of a 12th century King. When any one man establishes by manipulative means the power of life and death over fellow men in deference to all existing law, it is a crime. Treason.

Alex Jones was right, gun control means 1776 all over again

A line in the sand: when is 1776, 2.0?

http://www.earlyamerica.com/SOON, thanks to the push for gun control, when each of us must decide if we are subservient and wiling to be the ones to pay the price by  giving up our rights as well as the means to insure them… or if we will instead assert our rights and throw off the yoke of fascist rule of the New World Order by defending our guns in resolute defiance BY RULE OF LAW; the Constitution’s Second Amendment. That’s what it is there, for — it is not there for Duck hunting rights. It is that we might always have available Minutemen, and all who are able ought serve.

Heed my words, for I have been warning of this moment in time for more than ten years, starting with my bookset, Fatal Rebirth.

Note: Fatal Rebirth predicted Sept. 11 events in sponsorship of Middle East wars for oil. It predicted assassination plots against Ross Perot to kill the third party movement (indeed, mailed anthrax attack on his family would cause him to withdraw from the election the very night he would have won a place on the ballot and legitimized a third Populist political party). It predicted many things, including a series of mass shootings to enable gun control legislation.
 
It also predicted the next wave of terror attacks, including likely locations and methods, as false flag ruse to declare Martial Law, suspend the Constitution, and go door-to-door to collect ‘contraband’ and discover ‘terrorists’ (after our guns, mostly). But it also predicted how to resist and overcome such tactics, with specific advice to the Militia and others wishing to resist. You can get a free copy of volume I ebook by email to pppress at century link net.

I’ve written many posts about the coming moment, too, best described as that critical moment when each of us must decide if a line in the sand has been crossed which cannot be tolerated. Some of these posts are listed below, others are linked within this text. In one, I put it this way: government plays Russian Roulette and puts a gun to their head every time they undertake an oppressive or unconstitutional act, and pulls the trigger at its signing into law.

Eventually, they will go too far, and it will be yet another shot heard around the World; 1776, once more. It is, after all, how revolutions are started. An attempt to seize and restrict gun ownership is that line in the sand which must not be crossed, even at risk of escalation to armed rebellion. It guarantees not just one shot, but many, many, many more immediately thereafter. Only a fool would fail to realize that if any such revolution comes, those who are deemed as traitors will find it was as if there was a de facto bounty upon their head.

And from the very beginning, at the time the Constitution was penned, and the Amendments thereof brought into being, Thomas Jefferson and his patriot fellows warned this would be so: “The beauty of the second amendment is that it will not be needed until they try to take it.”

That Jeffersonian comment underscores the reason for its existence, which has NOTHING to do with the right to hunt or protect us from criminals, but everything to do with being able to protect us from government run amok. Our government runs AMOK, NOW, and has for some time. Shame on YOU for allowing it to go this far! Shame on me and you if we do not at last toe that line in the sand, standing firmly, side by side.

Are mass shootings simply false flag operations to take guns?

Let us be clear: what defines treason?

Treason defined on the fly by Mobs: Fascist Government Leaders (including Police officials) hung by the mobs when Mussolini was overthrown

Those in power define the answer, the wording of law not withstanding. I am likely now, or soon to be, like all dissenters, activists, and Constitutionalists, gun owners, and the like, as a single class targeted by a fascist coupe marching toward their New World Order, to be declared guilty of treason for daring to write these words. That’s the way Fascism works, and why no one is safe when it rules. But should 1776 revisit, and the People and Constitution win, WE will be the ones who define Treason. Here is my view of what that definition should be:

a) It is treason to swear an oath to uphold the Constitution while at the same time being a member of a New World Order institution which has their own oath to give up sovereignty in favor of a unified World government (which, ultimately, enables seating of the Antichrist). Therefore, a long list of governmentals are de facto traitors by virtue of lying when they gave their oath of office — while being members of the Tri-Lateral Commission, the Bilderbergers, the Council on Foreign Relations, Skull and Bones, or being a Rhodes Scholar, or similar.

These groups all require agreement to such contrary oaths or with stated globalist agenda, all of which is nothing less than rewording which conforms with the Illuminati formula for World domination, for which it was they who coined the term, New World Order. It is, today, very hard to find a Congressmen or other governmental who is not such a traitor, and the remainder look upon such groups as if wiser than their own ability to think for themselves, even to the point of accepting and acting upon their Globalist ‘reports’ as if Congressional findings. Treason.

b) It is treason to knowingly propose and vote for, and sign a Bill into law which is unconstitutional, or any Bill you have NOT READ and debated properly. Any act to subvert the Constitution, be it willful or by negligence, justifies the charge of treason, and let the defendant prove otherwise. Given that all such persons are educated in the law as a rule, one may safely presume there are no fools unaware of the significance, and the due seriousness with which their duties under their oaths of Office require of them to be diligent.

They undertook such acts at their own peril, and in full awareness of the responsibility to take care. So be it, when it comes time to answer for it. The list of such Bills is long, and many shall be held accountable. In fact, I can only think of two or three Congressionals who may be completely innocent, but there may, hopefully, be others. If not, perhaps the time for revolution is now.

c) To the point, here and now, today: ALL governmentals who support gun control laws which take away the right of the citizen to own military grade weapons are guilty of Treason. The Dick Act of 1902 made clear that the UNREGULATED MILITIA (that’s ANY citizen with a gun who stands to serve) shall NOT be denied the right to have military grade weapons. And yet, Congress has subverted this law time and again, by clever rewording of definitions, and the trickery of ‘dual oaths’ of service.

Therefore, all prior gun control laws which so inhibit access, or which create registration lists, are de facto null and void, and treasonous. Any attempt to collect weapons against the wishes of owners constitutes theft of private property on the one hand, and an attempted coupe on the other (treason), as does any attempt to prohibit or limit access, or to ‘register,’ anything with a Federal agency.

Personally, I want my own SAM and Apache gunship, thank you. I want all gun control laws repealed. The only law which I would approve is that to purchase a weapon, you would need be an adult of sound mind, and with no criminal record, to be determined by a blanket background check where the purpose of application was unstated, but authorized by the person being checked, as all background checks should be.
 
I only registration process should be to register guns, not owners: a registration process managed by the States which collects sample slugs from fired guns from sellers (the Registrars) for forensic comparisons in criminal matters. The State would not know who owned the gun, but if used in a crime, could obtain a warrant to get that information from the seller of the weapon. I further want colleges to offer firearms safety training courses as an alternative to ROTC, and as part of ROTC.
 
I want every State to have at least one citizen militia not subject to State control, and I want the State to provide them with access to military training facilities and expertise. I want every citizen who is qualified to own to be able to open carry or conceal carry. In short, I want to reduce the likelihood of criminal use of guns by means of practical and immediate (real and clearly visible) deterrence.
 
There are clearly other topics to be decided by law, such as matters of keeping guns away from unsupervised access by children, but I’m not taking up more space, here and now to totally define my views. If you want full details of how such a law could work, please request it directly and it will be made available by email.

d) All governmentals who supported NDAA are guilty of treason as well, for that law not only strips away whole sections of the Constitution, it even defeats the Magna Carta and gives the President the power of a 12th Century King to put citizens to death by mere say so (or torture or imprison them indefinitely without trial or evidence). Is that why DHS ordered 9,000,000 sniper rounds not for military use? That’s about how many dissidents there are in this country with a loud voice, such as myself, if I may be so bold.

e) All governmentals who support the DOD sending National Guard troops to war overseas without an Act of War and Congressional declaration of War are guilty of Treason. The Dick Act, again clearly denies the President or anyone else the power to order National Guard to active duty in any other fashion. They are NOT part of the regular Army subject to DOD. We have been fools to not be aware and hold both our STATE and Federal representatives accountable under the law their wiser forefathers set for them to follow.

f) All governmentals who support the endless spying and abuse of privacy of citizens at large in the name of fighting terrorism are guilty of treason, as are those involved in seeking the development and deployment of Political Control Technology (PCT) in like guise. Not only do they, and the 30,000 drones they want to put into our skies erode Constitutional rights and safeguards long cherished under the law, they make such protections meaningless. The very nature of PCT reveals their lust for totalitarian control.

Worse, they these things are a sham: they are not there because government fears a few thousand terrorists, but because government fears 360 million citizens, which is its RIGHTFUL state; the government is there to serve us at our pleasure, and be vanquished at our displeasure, not there to rule us at theirs, and subject to suffering their displeasure. Treason.

g) Any governmental who writes a law is also subject to the law, and thus any who violate the law and evade punishment by virtue of their power of office are guilty of treason. A government which violates its own law, as ours is so often guilty of doing, has no right to demand we obey their laws, doubly so when oppressive and unconstitutional. And doubly again when the person signing them into law cannot even prove citizenship to the simplest of standards. Such people make of The Law, something less, ‘the law,’ a mockery of no value whatsoever. I refuse to obey the law, but accept and follow only the Law of the Land (The Constitution)!

And let us not forget their oft cited caveat: we have recourse through the courts if we think a law unconstitutional. What recourse is that, really? When it can take a decade to work a suit through to the Supreme Court and cost millions of dollars, there is no recourse of practical meaning. When they can write new unconstitutional laws of like purpose ten times faster than we can negate an old one, there is is no recourse which excuses their writing them, and act of pure lust for power. Treason.

h) Media should never be allowed to be under control of the military-industrial-intelligence complex. It is so much under control, today, that I term it the Military-Industrial-Intelligence-Media (MIIM) Complex. When CIA puts thousands of operatives into media… when the top three TV networks are owned by military contractors (during the Flight 800 time frame, they were)… when a newspaper publishes the names of all gun owners and deliberately places their family, homes and the guns in danger… when ‘unafraid’ and ‘fair and balanced’ means ‘the truth is whatever government and globalists say happened, facts be damned,’ then those involved are guilty of Treason.

This list could be (should be) longer, but this is a blog and people don’t like them to be too long. So if they come for the guns and shooting breaks out, heaven help virtually any governmental captured, should the Constitutionalists and Patriots win out over ‘the law.’  So. Congress, and Mr. Obama, usurper King… spin the cylinder, put the gun to your head, and pull the trigger by signing that Bill. Let’s  see who pays, and what the price shall be.

You know where I live, and many more like me. You have lists of gun owners through previously written gun laws which should never have been allowed. But every citizen knows where all of you are, too. You don’t have enough Men in Black to get the 9 million activists before the rest of us come after you in numbers you can’t stop. You certainly don’t have enough to go after all 300,000,000 guns we possess… or is that why DHS also ordered 4.2 billion rounds or regular bullets?

What will you do when they come to your door to search for guns?

Who controls gun rights?

It is not lawmakers in Washington, D.C., who write illegal (unconstitutional laws) on purpose. They control only their own fascist rhetoric. The framers of the Constitution, and that document, are the ONLY authority we need obey. Even if you do not own a gun, the weapon Washington fears is in your hands; they fear a united WE, the PEOPLE.

Ergo; to lawmakers and other power usurpers and their minions of enforcers who disobey their oaths of office: I dare you  to try to take that weapon from our hands. Bring on 1776 2.0, if you must. Clint said it best. “Do you feel lucky, Punk?

Well, do you, Punk?

Note: the current proposed (Fascist Feinstein) gun law (clear analysis, here), will essentially force gun owners to give up the bulk of all pistols, rifles, and shotguns in a manner not unlike already undertaken in Australia. Those efforts resulted in a huge spike in gun violence as criminals were given a blank check knowing no citizen was protected by the likes of Mr. Smith and Wesson. We lost what? Well under 100 lives this last year to gun violence of the type the legislation claims to be defeating? Australia lost 93,000 lives to gun violence after confiscation, and their population is a mere fraction of our own. Yeah. Gun control works. It works for fascists and criminals (same thing, different levels of prowess and evil goals).
Do not obey illegal laws. Challenge authority. Stand on your rights.

 

12 Frightening New Questions Illuminate the Dorner Urban Legend


Just when you think you’ve heard everything about a major news event which suffers questions pointing to a conspiracy, someone figures out or finds something others have missed, or failed to see in the same light. I like being that person.
 
By H. Michael Sweeney, copyright © 2013, all rights reserved, proparanoid.wordpress.com
Permission to duplicate online hereby granted provided it is reproduced in full with all links and text colors in tact and unaltered, including this notice. 
 
12 new questions/veiwpoints addressed in this blog:
•  About the validity of physical evidence deliberately left at a murder scene;
•  About the validity of the ‘mental torture’ call to Randal Quan;
•  About the death of innocent bystanders;
•  About using a hotel on a Navy base;
•  About the million dollar reward?
•  About footprints in the snow, and the death of the one man with the answer;
•  About the ‘chance find’ by a citizen and a news crew of a James Bond-style assassin’s weapon;
•  Several questions about the Death of Chris Dorner.

Why Chris Dorner was murdered and framed

Questions?

mythbustThe Web is awash with questions and commentaries doubtful of the Dorner shooting, my own included. In my earlier posts, I’ve already addressed some of the same questions, and yet, have also come up with some new ones, or new insights upon existing questions. They are presented here in hopes they will help further illuminate the matter toward a better grasp of the truth — which sounds more and more like Dorner being set up as a distraction or cover up for something larger, something with Federal fingerprints.

The first postDorners ‘Manifesto’: Manufacturing a D.B. Cooper-ish Urban Legend?, analyzed Dorner’s alleged ‘Manifesto’ and showed a long list of reasons it appears fraudulent, whole sections of it written by someone else, thereby validating concerns that Dorner was a patsy and a conspiracy was in play. 

The second postDorner, the Urban Legend: Implications Behind a Fraudulent Manifesto, took a much closer look at the crime than most online treatments have employed. It provides deep-background information which suggests Dorner might have been a mere playing card in a high-stakes military or CIA project, possibly pre staging for a Martial Law sponsored coup. Ergo, the Ace of Spades graphic.

If you have not read these earlier posts, and are not comfortable with accepting the above descriptives of their content as viable concepts or factually accurate, please read them before reading this piece, or it will waste your time, as your basis of understanding will be in the absence of key information. Also be sure to review the excellent and revealing ‘related articles’ at the bottom of this page — especially the video interview relating Chris Dorner’s contacting alternative media and essentially confirming many of the points I’ve been making in my posts.

Was Chris Dorner a pawn in a Federal Plot?

Questions which point the way to understanding, even without answers

DornerMyth1) Dorner’s gear found at the first murder scene: Why would Dorner choose to leave Police equipment traceable to him at the scene, when said equipment would be valuable to ongoing operations if intending a killing spree? Curiously, there is video evidence that he did this. Someone who looked like Dorner, at least at distance in the poor quality view, in a vehicle which was apparently his (no definitive statement on that in reports, for some reason), is caught on a security camera dumping the items, including his badge and police uniform. Why would Dorner do this in front of a visible security camera in broad daylight? The murder took place at night time (see the news video report, toward end). There would have been cops already swarming the area, making it a high-risk adventure.

Why would Dorner even leave the gear at all? It would be valuable in any further covert applications if he was intent on continuing the alleged killing spree. It can’t be to deliberately ‘prove’ to Police it was him responsible: the call to Quan, a mere fingerprint, or a call to Police would have served as well and would be far safer. But it does make sense if someone was trying to frame him, sending someone who looks like him enough to pass for him, especially if borrowing his car to do it.

2) The alleged call to Quan by Dorner: If Randall Quan represented Dorner at the review hearings which resulted in Dorner’s dismissal, why is it only described in media references as a call from someone ‘claiming to be Dorner?’ Other qualifiers like ‘may have,’ ‘allegedly,’ etc., were almost always used. Would he not know Dorner’s voice?

Bear in mind that where a caller deliberately makes rude and insulting, emotional jabs at one’s psyche, the resulting change in mental state (anger, mostly) will deter one’s perceptions and judgement of such things. To me, it sounds like Quan was enough of a professional that he at least recognized the possibility of the voice not being Dorner’s, and must surely have couched his statements accordingly, else why did LAPD statements and media originally do so?

3) The death of innocent bystanders: If killing Monica was because she was family, as claimed by the manifesto, why kill her companion? Dorner should not have known he had proposed to Monica only days earlier, and Dorner has been repeatedly cited as taking care not to harm innocent persons. Likewise for the trainee with Crain. Why harm those men? Might it be because both men could have seen who the real killer was, a risk addressed by a killer who could not afford anyone saying it was not Dorner?

Kieth Lawrence, killed with Monica, can be seen wearing what appears to be a Police uniform in some online photos, but he was not a Cop. He (article) had been a security guard at a Universtity, and had undergone trainings with Ventura County Sheriffs and Oxnard Police, but should have been seen by Dorner as purely a — he was NOT wearing his guard uniform at the time of the shooting, and thus was unarmed. Many accounts say there is evidence (?) Dorner stalked them both for some time, so surely he would have known Lawrence was not with any LEA, certainly not LAPD.

It is also interesting that both were shot multiple times. In fact, so many that reloads would have been required, or for gun grabber’s edification, a high-capacity magazine was used — or — unless there were two shooters.

5) A hotel stay on a military base: Why did Dorner go the Naval Base at Point Loma (San Diego — see timeline)? It was confirmed that he had been in a hotel ON BASE and the base went into lock down when someone reported seeing him. Could it have been an attempt to meet someone who might provide him with evidence he was being framed, or something useful as a blackmail insurance policy to force (someone high up) to call off the dogs?

6) The million dollar reward: Why (and how) was a $1M reward arranged for so quickly, and who really managed that hat trick, when normally, $20K is the most anyone ever sees pinned to their name, and only after much time has transpired since the manhunt began? Only bin Laden and associates have, to my knowledge, enjoyed that level of value on a wanted poster, and so quickly. This article seems to have a convenient but implausible answer (just above second video); a collective of leaders from the area including businessmen ‘came together.’ Really? When does that ever happen, elsewhere?

7) Footprints in the snow, and the death of the only man who knew to track them: How convenient is it that the final standoff comes to pass because two officers ‘track him’ to the cabin… and one of them is fatally shot to death — a super-cop sent on Dorner’s chase like a bounty hunter? The other was wounded. Jerimiah MacKay, killed at the cabin, was a 15 year veteran of the San Bernadino’s Sheriff Dept. His specialty was going after stolen cars. He was on Dorner’s case from the outset, but fared not better than any other Cop. But in less than four hours after a truck was reported stolen by someone matching Dorner’s description, he and his partner were tracking footprints in the snow to the Cabin. Excuse me, but how did they know to track these particular footprints?

They had NOT found the stolen truck, so how and why did the presume these to be his footprints, or even know they existed, and where? NO ONE had ever seen Dorner alive near the cabin, nor any other person who might have been responsible for the footprints they choose to follow, nor, for the matter, whoever really fired the shots that felled them. Next came an swarm of lawmen and choppers, and the Cabin was set afire. Restating the question more pointedly, how did the dead Sheriff know to follow the footprints, unless there was some foreknowledge; a conspiracy afoot requiring Dorner’s body to be found cindarised? Now that he is dead, we may never know how he knew how to find those footprints, and why he knew to follow them.

8) The finding of a murder weapon by a citizen and news crew: A man reportedly found a crashed car (not the truck allegedly stolen by Dorner just prior to his being cornered) near the cabin, and nearby laying in the open in the snow at the roadway’s edge, a Walther P22 pistol with silencer and flashlight (a James-Bond style, professional assassin’s weapon). Coincidentally, a news crew happened along just then, as well? And they thought seeing a man standing at the side of the road was obviously newsworthy enough to investigate and interview?

This is three days after the Police the Cabin was fired and Police had swarmed into the area, and the day after concluding their investigation in the area, opening roadblocks to the public. Anyone see red flags here? If not Dorner’s truck, who’s car was it, and who’s gun? If Dorner had somehow stolen a car after stealing the truck, why has it not been reported? The car renews interest in and underscores the question about how MacKay choose to follow footprints, and where they originated, not just where they led. It is also raises the possibility that whomever killed MacKay was not Dorner, but a professional assigned the task.

9) The death of Chris Dorner: Was Dorner dead already, killed at some point well before the cabin event? It would be easy to have staged the events leading to the fiery conclusion, especially if one man knew to follow the footprints to the Cabin preprepared with Dorner’s body and rigged with squibs to simulate gunfire. It would only take a sniper to eliminate that man, the one possible person who might know the truth or unknowingly expose it if allowed to live, perhaps the only one outside of any inner conspiracy circle within LAPD or CIA/military camps.

10) The tale of four sets of ID, three wallets: How did the wallet survive the fire, and how many wallets and ID sets did Chris Dorner own? There had already been multiple reports of his wallet and ID being found, and yet they also find it, in tact, with readable plastic ID, in the ashes of a building where nothing else survived the flames. Add in the discarding of his badge as yet another form of ID. I DO NOT BUY IT.

That is specifically one of the oldest tricks in the intelligence community’s playbook for framing someone or making it seem that a body is someone it is not. Yes, it can also be used to misdirect authorities as to your true presence or whereabouts, but you only need employ that gambit generally once, and even then, only when making a major tactical move (like an escape, or an assault). Four times? Not synchronous with either escape or subsequent assault? And so close together in some cases, essentially wasting valuable ID resources?

11) The body of Chris Dorner: Is Dorner even dead, at all? If it were not for the phony ID find, I might not be moved to ask. But it implies official deceit. So, is he alive and vanished by virtue of NDAA style actions by our acting President or a unilateral military decision, or has he managed to pull off his own escape plan? I doubt the later, but even the Coroner’s report of dental matches, or DNA match will not be proof enough to answer the question; given the weight of material pointing to conspiracy, a fraudulent Coroner’s report is simple to arrange if CIA is involved, and easy enough for lesser groups.

12) The fire and ‘suicide’: Why did, per police radio traffic, LEA deploy multiple fire-starting ‘burners,’ incendiary tear gas canisters, if not intending to start a fire? Why did they turn away fire trucks with a decision to wait until all four corner’s had caved in once learning there was a basement? In almost every use of this kind of device, a fire erupts if it lands on or against anything flammable. Using multiple burners insures a fire. Was it to make sure the only way to ID Dorner’s body was dental records, the easiest of all to tamper with when officially faking someone’s death? Was it to insure that Dorner never had a day in court where he could expose crimes by LAPD or others well beyond those already known?

Bonus Question asked by others re Media complicity: Why did media volunteer to black out the Dorner event already underway? Choppers in the air pulled away at Police request issued thru FAA (suspicious and completely unprecedented in its own right), because Police claimed ‘news coverage might tip Dorner off.’ Excuse me, but the gun battle had already ensued, and the cabin was already surrounded. Police positions were not clearly revealed by aerial video because of dense trees about the cabin and the distance and angles involved. So what was the threat, again? If Dorner didn’t already know he was surrounded after engaging in a gun battle, he was not likely to be watching TV to find out.

And how do you get a TV signal way out there to the Cabin, in an isolated valley, when the cabin had no TV aerial visible, and the nearest broadcast station carrying feeds were in LA, 67 miles away on the other side of mountains forming the valley? What was the real reason Police wanted no one to see document they were doing? Why did media comply, knowing their signal was of no value that far away? Why did FAA aid in that cover up?

Why was an assassin’s pistol found by civilians near the cabin after Police finished investigation?

Summary

All these question and nagging discrepencies are the stuff which makes for an Urban Legend. Remember, an urban legend is always based on some kernel of truth, and yet is almost never truly what it seems on the surface. People tend to believe the legend, and fail to ask the right questions even if choosing to look closely. Dark lies need to be exposed and examined carefully in the light.

In looking closely, ALL of the above questions imply their own answer: a conspiracy, lies, and intelligence community tricks being employed. Whether those tricks are by CIA, military, or LEA application is something only the answers to the questions will reveal. But you (in bothering to read this), I, and other ‘conspiracy theorists’ seem to be the only ones asking questions. Given the obvious nature of many of them, that is its own clue something is wrong, something quite related to the bonus question. Anyone not seeing that, is not paying attention.

Turn on the damn flashlight!

How did Police find Chris Dorner?

1.4 Billion Ammo Orders Use Satanic Magic Numbers


When satanic leadership of the NWO undertakes a plot, you can bet there are satanic magic numbers in use, somewhere. Sometimes the obvious is right in front of our eyes, if we but just look askant.

Homeland Security (patch) Police (helmet)? Why does DHS want Mine Resistant Behemoths like this in your city?

Why did DHS order 1.4 billion rounds of ammo? Satan made them do it!

Updated March 6, 2013, and errata:  A previous update of this same date was in error as it implied DHS had ordered 2,717 MRAPs. Claims do abound on the Web that DHS’ has also placed a recent Order for 2717 MRAP (Mine Resistant Armor Protection) Light-Armored, Gun Ported Vehicles also uniquely satanic. However, the order was actually via U.S. Navy conduits and are intended to be manned by the U.S. Marines, presumably in overseas operations — but of course, deployment can actually be ANYWHERE.

Regardless, the smoke comes from fire theory is fueled by the fact that DHS does use the same vehicles (image) and has their own Police Force (ICE ERO — Immigrations Customs Enforcement Emergency Response Operations). If you go to ice.gov Web site you indeed find them crowing about numerous ICE ERO arrests in civilian police matters unrelated to either Customs or Immigrations. Ask yourself then, why does DHS want these vehicles and Police (soldiers by any other name) otherwise illegal under Posse Comitatus in YOUR city? Updated analysis marked via RED text.

Is DHS a Satanic branch of the US government?

By H. Michael Sweeney, copyright © 2013, all rights reserved, proparanoid.wordpress.com
Permission to duplicate online hereby granted provided it is reproduced in full with all links and text colors in tact and unaltered, including this notice.
Did Satan make DHS order 1.4 billion rounds of ammunition?
Does DHS have its own Police force?

What you will learn reading this blog:

•  That all numbers have meaning, sometimes spiritual, even satanic… and magical;
•  That the magic numbers are easy to find and translate, by way of example;
•  That the DHS munitions orders are rife with satanic numbers and meaning;
•  That that meaning implies they will be used against citizens and destroy the America we know in favor of the North American Union.

What does the DHS munition order have to do with the North American Union?

One indicator that the DHS 1.4 gigamunition orders are intended for pure evil use may be the actual quantities ordered, themselves. When the Satanic leadership of the NWO makes plans, they use every Satanic leverage they can muster to insure success. Magic numbers are almost always present one way or another. We got a taste of that on Sept. 11, 2001, and other black days in history where the date itself forms magic numbers. Yeah, yeah —mere coincidence, right? Don’t be so sure; read on.

What is a Satanic Magic Number, you may ask?

Transcendental, omnipresent, and as mysterious as it is infinite: the number pi

Transcendental, omnipresent, and as magically mysterious as it is infinite: the number pi

To answer that, we need to go back to ancient times and consider the dead languages, such as the Greek, Hebrew, and Latin. In those times, each letter of the alphabet had a numerical weight or value associated with it. The best known by most of us are termed Roman Numerals, but all these languages used such a system. Thereby, a given word, phrase, passage, or text document could have a numerical value by simply adding them up. That’s one reason the name of the Antichrist can be given as a number.

Also prevalent in those days was the occult practice of Numerology, the belief that each number carried with it a social and religious meaning or importance, a functional word/phrase equivalent. Numerology as pertaining to religious use was largely associated with cults and early Satanic religions, but also, even Biblic texts rely upon numeric valuations. Typically, the ‘meaning’ of a given number remained constant between the dark (Satanic) and light (Biblic) uses, with minor changes to suit emphasis or application.

By such a scheme, it is possible for a number series to be converted to a sentence-like translation or summary of its meaning. We will be doing a little of that, later on. In reverse fashion, one practiced in numerology can devise a number to have such a translated meaning. In addition, there are certain number properties which are thought to hold magical abilities which amplify the power or intensity of any such meanings. Doublets, triplets, and so forth, perfect increment/decrements (e.g. 1234), squares or other root products, and palindromes, those numbers which are the same forwards and backwards, and even prime numbers divisible only by 1 and themselves, are examples.

Note: If you find this interesting, you may also want to learn about the Gematria Calculator, which translates numbers to words and vice versa. The link also provides additional background details to the above presentation.

What is the history of magic or satanic numbers?

Machinations for illumination

The means of manipulation to relate magical translations has some flexibility. The number sequence 123456789 can be looked at for the purpose as a single 9 digit  number, or three three digit numbers, or it can be broken into pairs with the odd man out at either end, or in the middle. When in the middle, groupings both left and right of it may incorporate it for ‘double duty.’ Groupings can then be summed to obtain other numbers to be employed for translation purposes. Thus our example number in groupings of threes would become 6 15 24 as a result.

Sum results can also be summed yet again. The most common form of summing, however, is summing in strict pairs, which is a bit different. Summing our example result 61524 (not in pairs) would produce 45, the actual sum of the three numbers, but in pairs, it produces yet a new three digit number, 666, the most powerful of all Satanic numbers for obvious reasons: 6 is treated as if a pair, 15 sums to 6, 24 sums to 6. The other way to sum is to simply sum them all as individual digits, which yields 18, another code-like way to express 666 (3 x 6 = 18).

A thing to do, especially with larger numbers, is to review their table of divisors; all possible combinations of division the number supports. The quantity of divisors can be examined, as well. The only useful divisors would be those found magical themselves, and especially so for the more important Satanic numbers, 13, 18, and 666, or multiples thereof, or numbers which yield them by the above machinations. Indeed, there are many means which can be applied, but regardless of the method, the interesting fact is that the odds of being able to discover a magical meaning to any given number of some size (e.g. 5 or more digits) is relatively small, despite it being easy to find magical numbers by the described means. Restated, it is easy to find magic numbers, but not easy to find magical meaning; more is needed to impart meaning and actual power.

Only a few specific numbers in a given range (e.g. 10100 – 10200) would have much going on in terms of useful magical impact. 10100 can be argued a magic number, for instance, because it has the doublet 00 and the palindrome 101, and is based on the the number 1 which has a significant meaning in its own right (primal force). But that is not enough — and yet is tantalizing enough that we ought look more closely.

Indeed, if employing the divisors method, we find it divisible by the doublets 1010, 2525, and 5050, and the additional palindromes 101, 202, 404, and 505. If we cared to do so, we would learn these numbers have meaning of their own. Thus it turns out to be a magical number, but yet, it is not Satanic (the meanings are good, not evil), and therefore of no value to our search — unless we encountered an ammunition order in that quantity, in which case we might deduce it for a good cause. We do not, and should not find it, in that those seeking good are admonished in the Bible against using numerology, and thus it should be only by coincidence or divine providence that they would have elected a good number.

Who uses magic or satanic numbers?

Not just any old number will do

The important thing is, finding a Satanic number is not common enough that one can argue ‘any number can be shown Satanic.’ In our sequence above, one does not encounter a number with the potential for even a mild Satanic interpretation until 101124, which is able to produce the number 18 in machinations several different ways. Even so, it is not sufficiently dark to be used for justification, because it does not enjoy any of the other requirements:

It must afford an actual translation which imparts a meaning, and/or, alternately, enjoy a symmetry or consistency as if a ‘theme,’ and/or, alternately, offers a myriad of such finds employing a wide variety of magical numbers; it should tend to be somewhat obvious and clear cut in nature. If it does not hit you over the head, it’s probably not intended to have magical meaning… unless, perhaps, it is part of a set of other magical numbers where one might deem to look for a theme within the entire set. That complexity, fortunately, is not required with the ammo order, as each number appears to express itself, alone, and as a whole, the entire order’s theme is also consistent with any individual number’s meaning.

Indicators are indeed everything. In numerology, select numbers were deemed to represent good, and others, evil or occult, meanings which could be used to reference conceptual constructs, events, outcomes, traits, or even objects or persons, etc. You can learn about any (usually limited to two digits) number by typing into your search engine, ‘what is the meaning of x,’ substituting your target number for ‘x.’ Some references will focus on positive spiritual uses, some on general Numerology meaning, and a few will focus on occult uses. However, even the spiritual and less blatantly dark Numerology definitions will paint a useful picture in most cases. Try several resources.

One must not discount the opposition, either. If truly seeking translation, one must expect to find a mix of good and bad magic numbers. For example, if the message were intended to be something along the lines of ‘Satan destroys god’s plan for man,’ it might look something like 18 (Satan) 11 (destroys) 27 (salvation) 181127. That number contains a palindrome 181, which sums to 99 in pairs (using the middle number in an odd digit count with each number to its left and right), which again sums to 18, and the last four sum to 11 yet again collectively. The first four sum to 13 (sin), the mechanism by which Satan destroys salvation. The theme is present and expressed several ways. So if I was an evil Mason designing a Temple or other building of mystical import, I might make sure to employ that number and others like it in the dimensions (e.g., expressed in millimeters, it equals 594 feet, where 594 sums to 18, 94 sums to 13).

How are magic numbers used in the real World?

Real World example

Indeed, we find precedence. There is in India one the tallest buildings on the sub continent which is of that height, called Planet Godrej. Godrej is an Indian personal name which translates/relates to the occult Zoroaster metaphysical faith, also known as Zarathrustra, an ancient Persian occult faith (oldest on Earth) of mythological importance to the ancient Egyptians, and therefore, to Masons. The name is historically associated with wealthy business families worshiping Zoroaster. Remember Ghostbusters, the movie? The evil from the other side in the film was based on Zoroasterism.

Thus Planet Godrej might be intended, by its designers, both by its name and its dimensions, to represent diversion of Man from Salvation by means of sinful business efforts, planet wide. What is the building actually used for? It is a luxury apartment complex catering to wealthy business leaders in the heart of Mumbai (Bombay), each replete with servants quarters. It is located in an entertainment district which includes gambling. There are only two other buildings of the same height in the World cited on the Web: a similar residential building for business leaders in London, the Vauxhall Tower, and one of the five Suntec towers in Singapore. Vauxhall is a name derived from the Russian pleasure gardens of the Tsars, a place of diversions from mere amusements to outright sinful sexual excesses for business and political leaders in Russia. The Suntec towers are part of Suntec City, a complex of business office and convention spaces, residential, and entertainment facilities. See any themes, here? I don’t make this stuff up, you know.

What numbers are satanic?

Meet our magic numbers

Here are the numbers we will focus upon for our purposes, today; those numbers most used to represent Satanic dialog/themes, or to clarify them — in the simplest and briefest of summaries. Note there is some translation taking place in the larger numbers employing the smaller number’s meanings, so you see how translation can take place with consistency. Those few in bold are the true Satanic numbers of power.

  3  Fullness
  5  Balance, the power and limit of man to control 
  6  Illumination, enlightenment, legend, man
  7  Mystery, esoteric or scholarly magic, associated with Saturn, a name for Satan, might be a curse
  9  Visitation, spirit
10  Law, obedience 
11  Imperfection, disorder/chaos, that which precedes destruction
13  Rebellion, depravity, sin
16  Material power, incarnation
15  Three dimensions (reality), new direction, blinding temptation (Satan)
17  Victory, Son of Man (Christ), liberation
18  Oppression, bondage, slavery  = 3 (fullness) x 6 (legend/man/illumination)= 6+6+6 = 666
21  Distress = 3 (fullness) x 7 (mystery, magic – a curse)
29  Departure, cast out = 3 (fullness) x 13 (sin)
30  Rulership, dominion = 3 (fullness) x 10 (law, obedience)
31  Offspring, branch
33  A sign, warning, predictor = 3 (fullness) x 11 (that which precedes destruction)
36  Adversary, enemy = 2 (division, double) x 18 (oppression, 666)
39  Infirmity, death = 3 (fullness) x 13 (sin) — the wages thereof
360  Encircle, trap, capture = 10 (obedience) x 36 (enemy)
666  Satan’s name

Now to the analysis of DHS ammo orders with the above in mind. To follow along and be comfortable with my findings, you may wish to open another window or tab to a divisors calculator, and to activate your desktop calculator. The divisors calculator additionally gives you the sum of divisors, often of value in the analysis. Because there are so many numbers which might be analyzed, I will simplify the presentation by focusing on the first number (which happened to seem to be the least magical on first look), the largest single order item, and the final total. You will then be well versed in how to check any of the other numbers on your own. Since it can be confusing to describe mathematical things verbally, I have also attempted to employ color coding to help you more easily see what is being referenced.

How do you find magic or satanic numbers?

The first item: .223 Assault Rifle ammuntion, yr 1 35635000 rounds

Sum of divisors: 83504520
1 2 4 5 8 10 20 25 40 50 100 125 200 250 500 625 1000 1250 2500 5000 7127 14254 28508 35635 57016 71270 142540 178175 285080 356350 712700 890875 1425400 1781750 3563500 4454375 7127000 8908750 17800 35635000

Bold = palindrome  Red = 13 sum  Green = 16 sum   Blue = 17 sum

At first I did not see too much going on with this number other than it was an unusual palindrome, 35635, and that the divisors contained three of those as well as three 17817 series (e.g., 178175). But the sum of divisors (83504520) proved interesting, too, when run through the divisor calculator: its 13th divisor is 18. It’s 57th divisor is 360 (entrap), 57 summing to 13, as well. Then, looking at the last three digits of the 178175 series, we find they summed to 13, also.

If this was all there was, I still would not have bothered going any further in my hunt, concluding there was insufficient magic present. A weak theme of 13 with a hint of 18 in play was not exactly ‘saying’ much. The hypothesis would have been found inadequately proven, and this article would not be warranted.

However, when one checks in groups of three or four digits, one quickly discovers that a large number of divisors, including half of those with 13 present by summations, almost always summed to either 16 or 17 either as a whole, or as a balance of digits in the case of those with 13 present. In total, there are six each 16 and 17 summations, three of the 16 conjoined with a 13. Thus the ‘theme’ would seem to be 16 (incarnation) of 13 (sin) is greater than or opposes 17 (salvation). In this case, it can be made greater because the conjoined instances are all palindromes, although, the odd number remaining 5 (balance), implies a balance of power is being contested.

Now, going back and looking at the original number 35635 again, we can see that 35 is 5 (balance, limit and power of man) x 7 (having to do with magic and Satan). This is another way of saying the same thing (balance of power in conflict). Further, that converts it to 57675, which can be summed in triplets to form the doublet 1818. Again, very powerful and weighted to Satan’s advantage against Man and Man’s salvation. With the same general theme being found expressed three different ways, I elected to write the article; the numbers said something after all.

DHS orders ammunition in quantities based on Satanic numbers.

The largest order: .223 Assault ammo, yr 3 728582000 rounds

728582000  728582000  728582000  728582000  728582000

Sum of divisors:  1761716112  1761716112  1761716112  1761716112  1761716112  1761716112 
1 2 4 5 8 10 16 20 25 40 50 80 100 125 200 250 400 500 1000 2000 364291 728582 1457164 1821455 2914328 3642910 5828656 7285820 9107275 14571640 18214550 29143280 36429100 45536375 72858200 91072750 145716400 182145500 364291000 728582000

Bold = palindrome  Red = 13 sum  Blue = 17 sum   Purple = 18 sum  Pink = 15 sum  Teal = 10 sum

Again we see palindromes richly present. The order quantity itself contains 858, which by sums translates to doublet 13, very powerful. The larger palindrome, 28582 likewise summed provides doublet 15 (temptation in spades). The sum of divisors is even more palindromic, containing 17617 as well as 171 and 161. That provides for one 13 in the former, and if summing the later together, provides 17, plus the outright 17 in one of them (171), and 17 by summing of the other (16+1). Then we also find a single number with two palindromes: 5828656, its first two  numbers summing to 13, second and third to 10, the last three to 17, the first three to 155828656  5828656  5828656

We find 13 is also present by summing in four divisors, each an ‘island’ without conjoining. However, 17 seems to be everywhere, in each instance conjoined with 18, 15, or 10, and in like manner, 18 is abundantly conjoined with not only 17 as just mentioned, but also 10. Indeed, the order quantity palindrome also contains two each of not just 13, but two each also of both 15 and 10. That’s a pretty potent palindrome.

In checking the divisors of the sum of divisors, as in our first year order, we find the number 13 pops up, this time rather than in the form of being the 13th divisor, it is divisible by 13 directly, which goes 135516624 times. That not only starts with 13, but contains two adjacent 13s by summing: 1355 16624, as well as containing 15 and 18 (135516624) by sums, or outright 666 if summing just the last pair, and 17 two ways by dropping either 1 in the first sequence. You also get 666 summing the 51 ahead of the 66, and of course, 55 gives you 10. All the key numbers are present in the one number, which is multiplied 13 times to amplify its dark power. 

In almost identical manner, the palindrome 45536375 from the original divisors does the same, in overlapping combinations: 45536375 (17 15), 45536375 (17), and 45536375 (10), and 13 in the 553. Only 18 is missing in this one. Now go back to the actual order number, and you see it happen similarly, yet again: 13, 15, 17 and 10 are all there. From all these we deduce a consistent (three-way depiction) of a theme dialogs: 18 (slavery, Satan) vs. 17 (Son of Man) = ‘conflict’ or ‘battle;’ and 17 (Son of Man) vs. 15 (change of direction, blinding temptation); and 10 (obedience) through 18 (slavery, Satan).  These same themes have been repeated four times in this one order item!

Combining these, and we get the picture of a battle of some sort on an epic scale. Considering that we find 13, 18, 17 are the only ones which also stand alone (rebellion, liberation, slavery), it appears that is the nature of the conflict is to be a rebellion to decide between liberty or slavery.

DHS orders ammunition in quantities based on Satanic numbers.

Grand total of all munitions: 1405175654 rounds

1405175654  1405175654  1405175654  1405175654  1405175654

Sum of divisors: 2108519640
1 2 2819 5638 249233 498466 702587827 1405175654

Bold = palindrome  Red = 13 sum  Blue = 17 sum  Purple = 18 sum

Because the number becomes considerably more finite when it does not have a lot of zeros, we get very few divisors, and thus it becomes ‘harder’ to find magical numbers since there are fewer to consider. However, they are present. The quantity itself contains both 18 and 13 two different ways, and we do have one palindrome, and 17 exists outright, only mentioned because it will be omnipresent elsewhere.

The first two four digit divisors if summed in pairs, produce palindromes: 1010, and 1111, respectively. The next two divisors both contain a summed 13 (49), and the later of these can also produce 18. The next divisor produces a 13 in addition to a palindrome. We also find that most of the divisors contain 17 by summing: 5638, 249233, 498466, and 7025877827.

But we are not done. If we also compute divisors for the sum of divisors, we find some more interesting things not common to similar efforts with the other numbers. We find a wealth of palindromes. In fact, more than 20% of them have palindromes, including a 5 digit 67976, which makes for a doublet 13 by summation. There are numerous doublets, many numbers containing multiple doublets, including 4040 (40 is the number of death and rebirth, or destruction and renewal).

That number, 14954040 also contains both 13 and 18 in sums sharing the 495.  There are even very rare triplets, including 666 itself — twice! The other triplets, 333, and 999, additionally contain 13 in their construct. Like the original number, 13s and 18s also abound in many different ways. The overall theme for the entire order, then, is 13 (sin) amplifying the power of 18 (Satan) against 17 (Son of Man).

Who in DHS wants to overthrow the US by force in favor of the North American Union?

Update: 2717 MRAP vehicle order

Sum of divisors: 3360. 8 divisors:
1 11 13 19 143 209 247 2717

Bold = palindrome  Red = 13 sum  Blue = 11 sum  Purple = 18 (666)

A palindrom (717) starts this off, which sums in pairs using a shared middle number to the doublet 88, and we have a doublet 33 in sum of divisors. Both Doublets are divisible by 11 a number of times (3, 8) which sum again to 11. Still, not that much to crow about until we look at the divisors, of which there are very few, and yet which provide a wealth of results in EVERY divisor of note. The order is divisible by 13 209 times which sums to 11, and divisible by 11 247 times which sums to 13. It is divisible by 19 143 times which combine in sums to 18 (666). So, just look up 11 and 13 to get the ‘theme,’ and amplify that by 18.

Why did DHS order 2717 MRAP vehicles?

Summary

Therefore we see the simple outer theme, inwardly, concealed if you wish, expresses an overall theme akin to Armegeddon, or the Great Flood, to be visited upon America. But also, you see… if the NWO has is to its way and be able to establish a one-World government, the true purpose thereof is to seat the Antichrist, and lead us to the final End Times, actual Armegeddon.

But to get there will require something called the North American Union, abandoning the independence of Mexico, Canada, and the US altogether. But the greatest roadblock to that is the United States and our massive gun ownership which binds us like an insurance policy to our sovereignty and Constitutional integrity. Unless they can find a way to cancel out that insurance policy, they cannot have their way. The North American Union cannot come to pass without something drastic happening.

The numbers suggest they may at least think they have found a way to solve that. A bloody way. In fact, the sum of divisors of the grand total is equal to (270 x 13) + (3165945 x 666). Various sources cite the number of guns in private hands in America is 270 million. 3,165,945?  That’s just about the size of the US Military and Police forces, combined, depending on who’s numbers you use.  But that’s just me and some numbers talking.

How can the North American Union come to pass?

What do you think?

Support the second amendment if you hate the North American union!

Dorner, the Urban Legend: Implications Behind a Fraudulent Manifesto


What would it really mean if Dorner did not write the Manifesto claimed for him? Like many bumps-in-the-night mysteries in our national consciousness… the answer may lead to CIA and the Military.

By H. Michael Sweeney, copyright © 2013, all rights reserved, proparanoid.wordpress.com
Permission to duplicate online hereby granted provided it is reproduced in full with all links and text colors in tact and unaltered, including this notice. The image is specifically excluded from permissions to duplicate: see text with image.
Dorner, the Urban Legend: Implications Behind a Fraudulent Manifesto
 

What you will learn reading this blog:

• That there are more, darker possibilities than the obvious bad Cop framing a good Cop;
• that possibilities include direct ties to Rodney King and Operation Verdict in support of Martial Law for a military coup;
• that CIA has infiltrated LAPD (and most major LEA) for their own criminal needs and may be at the heart of Dorner’s fate;
• that there are many clues most of us have missed which foster TEN new questions which help understanding;
Did CIA or Military frame and murder Dorner?
What is the truth about Chris Dorner?

This original artwork is trademarked and copyrighted and may not be used in full or in part, altered or unaltered, without permission, if dissociated from this blog: I do not want some bad cops turning the left-half into some kind of macabre T-shirt. If someone wants to make the WHOLE thing into a T-shirt, we can talk.

This original artwork is trademarked and copyrighted and may not be reproduced in any form dissociated from this blog in full or in part without express permission: I especially do not want some bad cops turning the left-half into some kind of racist T-shirt. If someone wants to make the WHOLE thing into a T-shirt, we can talk.

In my prior blog post in this series, I showed more than a dozen reasons to question if Dorner’s Manifesto were his manifesto, at all. While portions were surely written by him, it also seems clear that because of different writing styles and the very construction employed, as well as external evidences relating to the security of Dorner’s Computer activity — the sections which paint Dorner as a mad killer were by someone else. I’m not the first to suggest it, but perhaps the first to fully dissect and expose. Without those additions, all you have is a laundry list of LAPD wrongdoing and an open letter to LAPD pleading for resolution by a perfectly good Cop.

If we agree that there is reason to question the authorship of the condemning portions of the document… then we have to wonder what else about the greater Dorner matter is real?

There had to be a motive, and a pretty powerful one, at that, to warrant setting Dorner up for murder and feeding us lies. So much of Dorner’s laundry list of LPD sins ultimately translate into or directly relate to racial prejudice. Dorner cites everything from racial slurs to violence, specifically mentioning the Rodney King beating/video to show how systemic it has been. But this cannot be the motive, in my opinion.

Racist Cop complaints are, within LAPD, a small-potatoes issue representing little ‘threat’ sufficient to motivate the fraud and murders involved. LAPD, even as Dorner points out, has a long history of such prejudice and covering ups. When leadership habitually protects those who step out of line in this regard, there is no threat worthy of the death penalty in yet one more accusation, even if by a fellow Officer. We are moved to think it has to be something else. Or does it?

Was Dorner a CIA or DOD patsy?

In the game of Hearts, playing the Spades can steal the whole deck

In the game of political power and control, it is our Hearts and minds which are at stake via psychological manipulation of the masses. The closer you look past the thin and faulty veneer of the Dorner story, the more the clues we find which lead us not just to bad Cops in LAPD, but also, unfortunately, to the CIA and Department of Defense and very dark things that threaten to impact us all. So hang on… this is a far bumpier ride than the manhunt we see on the surface.

As I document in my bookset, Fatal Rebirth (new special low price offer in place, by the way), the 1992 Rodney King beating Dorner was careful to cite — had led to CIA reconnaissance overflights of major US Cities to perform low-level, high-resolution aerial photomapping of black neighborhoods for something called Project Verdict. Verdict was preparation for the declaration of Martial Law if rioting broke out nation-wide when the trial of the 4 LAPD Officers involved was concluded with an expected white-wash verdict of ‘innocent’. So concluded, it was.

And based on a lot of indicators, it was planned that way from the start; a plot to overthrow the Constitution.

But it failed, though LA indeed became a battle ground like never seen in any American City, requiring the National Guard AND US Marines to restore order. 53 died, more than 2,000 were injured, and nearly 4,000 fires leveled whole neighborhoods and cinderized over 1,000 businesses. Had other cities followed suit, the whole deck of cards would likely now be under military control, exactly as forecast by our highest ranking military in the event of nation-wide martial.

Now know this: in the time frame of the beating, trial, and aftermath, King was reportedly described by various officials predisposed to rude thoughts as the ‘King of Spades.’ Also active World-wide at the time was Operation Gladio (still in play, today, it seems), a US/NATO clandestine effort to topple Communist Bloc nations which further evolved to include a series of false flag terror events targeting Americans and NATO citizens to justify repressive draconian responses. Was Verdict part of Gladio? No way to know, but it sure fits the mold.

Fortunately, Verdict was thwarted. But I have to ask: was it intended from the start to foster a military coup? POTUS in ’92 was an old CIA man, George Herbert Walker Bush, a man tied to many of the darkest of bumps in the night America has ever known, from JFK to Watergate, and beyond. An excellent review exists in book by Pete Brewton, The Mafia, The CIA, and Goerge Bush, intro here. Gladio was under his watch as CIA Director, and while in the Oval Office.

1992 was a hotly contested election year, and conspiracy rumor mills of the day were warning that a military coupe was in the making to insure Bush held office; under Martial Law, the election could be cancelled. Rodney King may have been the key to such a plan. Absurd? Perhaps, but let’s consider it for a moment, anyway:

Bush was running for second term against Clinton and billionaire H. Ross Perot. Clinton had his own CIA ties, as did Hillary, but I won’t bore you with the details, here — but when I was saying the same publicly, I got hate email laced with expletives directly from the Oval Office. I was at the time researching my four-volume bookset, Fatal Rebirth, documenting crimes of the New World Order from 1947 forward.

As result of my investigation, it became clear to me that H. Ross Perot was a dangerous threat to the two-party system of power control via Dog and Pony Shows of pretended and superfluous political differences. Given Perot’s growing popularity, I feared they would take him out. He was last Century’s ‘Ron Paul,’ without the benefit of a congressional title.

I warned the Secret Service, who did nothing but put ME under surveillance for five years. Meanwhile, Anthrax was mailed to Perot’s family (the same thing used to silence one of Bill Clinton’s State Police-assigned body guards when he was Governor of Arkansas, to silence him from testifying about Clinton’s ties to CIA drug running in Iran-Contra, a George Bush sanctioned operation.) The Perot attack was confirmed to me by my own back-channel Secret Service Agent contact. It forced him to quit the race the night of the Colorado Primary, which he won even after quitting. Had he not quit, it would have given him enough electoral votes to have a place on the main Nov. election ballot.

But the NWO does not want you to have true freedom of choice. So you only get to vote for the two candidates they offer you, both of whom they own outright. If you knew the full story of how Ron Paul was prevented from being on the ballot, you would understand. Even with two candidates, the election is rigged so that it does not matter much how you vote, though wild-card antics like Chad counting can upset the equation without angering Eurobosses. Here’s how, and why it relates:

In those days, I had already interviewed a man claiming a flight crewman of CIA’s Evergreen Airline had confessed details of a secret flight: Bill Clinton, George Bush, and others (not Perot) were flown to Europe to meet with Bilderbergers to decide who would be our next President, Clinton being the answer. The plane landed and taxied to the end of the runway, where other Bilderberger planes already sat waiting.

Everyone got onto the same plane for their meet after deciding who would be the new President, and then departed in reverse manner, never officially entering the country. While we cannot confirm if this is a true event, it would give Bush a motive for circumventing by directly usurping power through martial law to end the election process. But to declare it would require some kind of internal upheaval on a national scale. Could such be engineered, and yet not seem manufactured to anyone, especially the Bilderbergers?

Are the Rodney King and Dorner matters linked to a Martial Law plot?

Playing the rest of the black cards

The race card trick: beating King and getting video taped was the first step. King was the perfect choice: he not only had the same last name as Martin Luther, but when clean shaven, he looked much like the much missed, martyred man. Beat King with video documentation, and you get instant renewed martyrdom, and kindle angst anew nation-wide in the black and white populace alike. But good quality video at night in those days was not as easy as it is, today.

The high-tech (for the day) Sony camera used had just been purchased and was taken right out of the box for the first time that night in response to the beating, it was claimed. I say claimed, because right out of the box, the battery would have been useless. The person filming was a Canadian-born contractor who had been raised in Argentina. You know, that country where the Nazi’s went after WWII, and where George Bush has bought huge tracts of land, and a fun place known to be a CIA playground in South America.

The second was to make sure the verdict in the trial was ‘not guilty.’  That was arranged by: a) having the first judge removed from the case as ‘biased,’ and b) the new judge assigned changing the venue to an all-White, well-to-do community resulting in a jury of 10 Whites and one Hispanic. But how do you make sure the violence level upon such verdict is sufficient enough to warrant calling in the National Guard? Simple — step c) have the National Guard foment violence to prime the pump. False flag stuff. Military stuff. CIA stuff. Any sign of that in LA at the time?

Well, as Dorner himself also mentions, we had for Chief of Police in LA at the time one Daryl F. Gates, clearly a New World Order Police State mentality kind of guy. He virtually invented SWAT teams and Police intelligence operations involved in wholesale spying on civilians. He also pioneered ‘sweeps’ of up to 1,000 officers at a time to arrest and detain everyone of a given class (e.g., 25,000 black and Hispanic youths, known or suspected gang members) simply for the harassment value, and to keep them off the streets for the convenience of city public relations, such as employed during the 1984 Olympic games.

The spying operation did favors directly for CIA fronts, while other police operations, including drug enforcement programs ‘invented’ by Gates (CRASH) made themselves useful to sanctioned CIA drug running in LA County. Ask ex LAPD Officer Michael Ruppert, who has been trying to blow the whistle on CIA drug operations in America ever since he was approached by CIA for the purpose of recruitment while on the Force. Ruppert thinks Gates was a CIA Case Officer, a CIA in place asset.

We should mention Gate’s role in the CIA mind-control assassination plot against RFK, where Gates ordered key evidence destroyed because ‘it was taking up too much room, and an ex-CIA Cop in the Command Center under Gates, ordered Cops not to go after the Man and his associate, the Woman in the polka dot dress seen earlier with Sirhan, and later seen running away gleefully saying “We did it! We shot Kennedy!” At the time, he said, “We don’t want them to get anything started on a big conspiracy.”

So then, was there any false flag ‘stuff’ of the sort going on in the LA Riots? In Fatal Rebirth, I detail some little known facts which national media censored, but which was revealed in local news reports. Things like someone parking an unlocked railroad box car full of guns on a siding near the LA Watts black community, and even helicopters dropping guns like they were beaded necklaces at Mardi Gras; like staging a violent attack on whites by blacks and videotaping it for news use… the participants other than victims later identified as National Guard in civies; like four black men caught by Police driving around town with a car full of guns and Molotov Cocktails, later released to a National Guard Major who claimed they were his Men. Here is a bit of a taste; guns appearing out of nowhere, a first-hand account.

Is Dorner intended to spark race riots to allow Martial Law?

To triumph, play the trump Ace

So one question which arises is, was Dorner to become the ‘Ace of Spades’ (the basis of my artwork) in some delayed completion of the Martial Law scenario by the military? Is some future revelation planned which will show him to have been framed and then murdered by LAPD, a tactic seeking to rekindle the 1992 hatreds all over again?

Keep in mind that in preceding months, there have been, and continue to be, a rash of massive live-fire (blanks) military Special Ops raid training exercises conducted in downtown Houston, LA, Minneapolis, Boston, Miami, and elsewhere (YouTube is rife with videos). Not once did city officials get advance warning, causing panicked civilians, some of whom took up arms just in case they would need defend themselves from (someone).

And, also in the weeks prior, the US Army leveled the 43 Acre Sepluveda Basin Wild Life Preserve (home to 250 species of birds) belonging to Los Angeles City WITHOUT NOTIFYING ANYONE. And as I write this, reports continue to come in of whole trains, as well as convoys of trucks carrying military vehicles along I-40 to Los Angeles. Someone is getting ready for something centered around LA.

But in truth, I rank its being tied to Dorner as being lower in likelihood than Chinese invasion or other, more useful martial law scenarios such as pandemics, nuclear or bioterrorism, etc. It might even be easier to stage an alien invasion, given that DARPA has developed huge stealth (radar absorbing, visually hard to see, soundless) UFO-like craft which have been test flown and sparked UFO flaps, already. So why go to the trouble of trying again something which didn’t work well in 1992?

A little more likely: something redacted from Dorner’s list of LAPD sins

If we presume that the Dorner’s material was altered, it is reasonable to presume something was removed. Something so dangerous if made public, that it was worth killing for, and framing Dorner to silence him. Imagine for a moment, that the people ‘killed by Dorner’ were people who also knew too much or who were considered weak links in a conspiracy. Or, some of them, perhaps even all, may have simply been targets of convenience because they were mentioned in Dorner’s complaints against LAPD.

Monica Quan was the daughter of LAPD Capt. Randal Quan, ret., who represented Dorner unsuccessfully (and poorly, according to the Manifesto) in hearings which resulted in Dorner’s termination from LAPD. Both Monica and her fiancé, were found shot dead in their car parked at their shared condo address. What if someone feared that Randal Quan might have shared some secret with her? Might that have resulted in targeting her, and the boyfriend in case she had in turn shared it with him?

Within minutes of the shooting by some accounts, the ‘manifesto’ was posted on Facebook, though not discovered for many hours. Open and shut case, right? But think about it. If you were going to launch a killing spree against cops… how much advance notice and tactical warning would you give them? Dorner’s alleged post included excruciating details of the threat and methods he would employ. And then, there was silence for four days, giving Police ample time to put investigative resources in motion, and putting Dorner at risk of capture. How logical was that, tactically, if how it really went down? It makes no sense.

On the fourth day, a gun battle ensued when two LAPD claim they spotted Dorner near the home of someone named in the post as likely target. One of the two Cops was grazed, but their suspect escaped. But how likely is it that it really was Dorner, given that a total of seven people known not to be Dorner were shot at by spooked Cops thinking them to be? We are talking about Cops opening fire without warning and shooting people clearly not Dorner — in the back in some cases. Dorner is a huge black man. So why shoot two Hispanic women, a slightly built white male, and a young surfer dude? Clearly, they had no real clue what Dorner looked like, then. So I must ask, did they really know it was him in that first gun battle?

Then, that same day, a SWAT Team Officer, Michael Crain, also a bad Cop according to Dorner, was shot dead, and a trainee with him critically wounded while they waited at a stoplight — attacked by someone who ran up to the car on foot. A bit curious to me that everyone killed by ‘Dorner’ died in the front seat of their car… which means someone was waiting for them at exactly the right place and time for a quick hit and run operation.

That requires exceedingly good intelligence and access to very detailed and current internal Police information in the case of Crain. I don’t believe Dorner, an ex Cop, would have that level of needed information available. Do you? It may be helpful to know that one of the favorite assassination points for CIA hits is while the target is in transit by car. Funny thing is, though, it takes CIA-style tricks to insure that a target will stop at the one stop light you deem most useful for the hit. That means more than one person is involved. Are we to believe Dorner pulled the feat off single-handedly, or would an internal conspiracy be more probable?

And who is Crain? An ex-Marine. Dorner is ex Navy, thanks to his problems with LAPD. But while he was still a Cop and in the Naval Reserves, both would likely have been ‘in the loop’ with respect to any illegal or paralegal joint military-police drills of the type mentioned above. And, therefore, we may presume both might have known something about an illegal future operation, or some dark matter associated with one already conducted. So how far fetched would it be for one to be killed to silence them and the other to be blamed for it, and to modify Dorner’s texts for the purpose?

It’s almost guaranteed to work, especially if the first killing is scheduled at a time when Dorner would have no alibi he could prove, such as being home, alone. Imagine being Dorner: you hear on the radio of the Quan shooting, and realize… ‘My FB page mentions the elder Quan in a bad light. That may make me a suspect. I’d better review my wording.’ So you try to do just that and discover you are locked out of your own account, and you recall your Credit Union account was hacked by an LAPD Officer once, already. So you just go to the page and find your list of complaints has suddenly become a confession (manifesto). You have no choice but to run, knowing Cops kill Cop killers almost always, no questions asked.

Especially run when you hear news reports that: a) some of your personal Police equipment was been found in a trash bin near the murder scene; and b) someone claiming to be you called Randall Quan to mentally torture him over Monica’s murder. And, thereby, unfolds the story we have been fed in media. But as we’ve seen, there has to be more at work here than that.

If the Dorner manifesto is a fraud, what can be believe about the official story?

Next up: 12 Frightening New Questions Illuminate the Dorner Urban Legend

Will America survive Chris Dorner?

 

Dorners ‘Manifesto’: Manufacturing a D.B. Cooper-ish Urban Legend?


What would it mean if the Dorner ‘Manifesto’ was not written by him? What if he were deliberately being made into an urban legend to cover up crimes by the real authors, including Dorner’s murder before the Cabin assault even took place?

By H. Michael Sweeney, copyright © 2013, all rights reserved, proparanoid.wordpress.com
Permission to duplicate online hereby granted provided it is reproduced in full with all links and text colors in tact and unaltered, including this notice.

What you will learn reading this post:

• There are many clues which make it doubtful that Dorner is the sole author, such as…
• there are three distinctly different writing styles, typically standing out as if additions after the fact inconsistent with and reversing the intent of material clearly Dorner’s;
• there are past tense and third-person references to Dorner as if already dead, and implied future tense when relating to the murders Dorner allegedly committed;
• there are clever tricks designed to paint Dorner ‘mad’ which not even a crazy person would be fool enough to write.

Was Dorner framed? Who wrote Dorner’s manifesto? Was dormer killed and his body put in the cabin?

wallet found

They claim they found Dorner’s wallet and readable ID here? Sure. But that’s OK, because they also found it at the Mexican border. Sure. At least that’s what they told media to tell us when it was expedient. Image: redicecreations.com (click) – about two wallets.

I must say that when I first heard reports about the Dorner incident, each update simply seemed more and more… unbelievable. Increasingly, the possibility grew in my mind that it was a set up. I mean, you have a good, moral cop fighting a just cause against corrupt, brutal, and racist cops harming citizens, and then he’s suddenly a crazed killer destroying the very foundation of his case by brutally murdering a minority citizen… not to mention cops? And everyone signs off. Please.

That’s just as believable as conveniently finding known terrorist’s wallets with their real identities, not alias’ commonly used as a cover, among the ashes in attacks where the largest thing otherwise remaining was a mote of ash. They’ve pulled that one on us three times that I know of, including Sept. 11 attacks. No false flag here… move along, move along.

But wait! They’ve found Dormer’s wallet repleat with readable plastic ID, where? The ashes of the burned-to-the-foundation cabin? AND, they found them at the Mexican border just hours earlier? No conspiracy here… move along, move along.

The only way I could justify the actions claimed of Dorner in my mind was if it were yet another ‘mass shooting’ event sparked by psychotropic SSRI drugs of the likes of Prozac, Paxil, Zoloft, and others. These killer-makers all have murder and other violence as unpredictable side effects, and have been found to be in use by virtually all mass shooters. Ban guns? No thank you, but please, ban SSRIs and zany brain Witch Doctors who keep inventing new reasons to prescribe them like candy. Check out the facts and how SSRIs have bearing on the matter.

Sure. If Dorner was suffering depression, stress, and daily anxiety that he might be shot dead by dirty cops for ‘crossing the Blue Line,’ he might have been prescribed SSRIs for cause. But I doubt it. Because consistently co-present with the violent side effects is a lack of reason, logic, motive, or even an understanding of why they undertook violent acts, or even clear recall of them. Dorner, in his ‘manifesto,’ not only remembers, but screams a reason, motive, and understanding — flawed thinking though it be. But then, there are problems with the validity of that document…  I don’t think he is the sole author.

Was Dorner framed? Who wrote Dorner’s manifesto? Was dormer killed and his body put in the cabin?

A manifesto which is not a Manifesto

Trotted out was the alleged Manifesto, which is in this case is really nothing more than a dumb-you-down term used much the same way the Davidian ranch at Waco and Randy Weaver’s log cabin were variously called an ‘enclave,’ a ‘fortress,’ or a ‘compound,’ all implying military defensive planning in their design. Propaganda BS. Reading Dorner’s work (uncensored version), you find there is no Manifesto present, at all.

No. Instead, it seems like five distinctly different texts in three differing styles as if by three different persons, and for four different purposes, not counting some political sandbagging and blindsiding thrown in for good measure. If you take away the things which seem added, all you have remaining is a plea for LAPD to do the right thing about a laundry list of wrongdoing.

1)   The main body, which accounts for the bulk of the 18 page document is a detailed review of crimes and abuse of power of LAPD Officers, leadership, and events relating to Dorner’s whistleblowing and the resulting harassment and cover up — an event log. There is reason, calm, logic, and moral dignity present, and cohesive writing style. Clearly, it is the Dorner who fits the profile of a good cop and who is in control of himself. No Manifesto, it is merely a point-by-point, blow-by-blow accounting of his experiences trying to be that good Cop.

2)   The introduction paragraph, on the other hand, is something else: a ‘confession’ of the murders and what sounds like an attempt to ‘excuse’ them by virtue of righteous indignation forcing acts of extreme violence as a “Last Resort,” which is indeed the title line. But were these things added later by someone else?

Particularly problematic is the writing style of this large paragraph. It is like the 9-11 cell phone calls from hijacked planes where callers spoke in ways no one ever does, revealing the calls were staged: “Hi, this is Mark Phillips, your son.”  Would not a Mom know her own son, and their family’s last name? Interesting, especially since cell phones in those days did not work at altitude.

In the ‘manifesto,’ we read what seems like someone else trying to make you think them Dorner. Why would you write about yourself the way others describe you when you are not around, and generally only at your funeral service or on a death bed — in past tense?

Example a): “…completely out of character for the man you KNEW who always wore a smile wherever he WAS seen.”

Even if one actually believed that’s how people saw them, would they not more likely in such a case say; “… out of character for someone who always tries to wear a smile…” or “known for always wearing a smile…”?

Example b):I know most of you who personally know me are in disbelief to hear from media reports that I am SUSPECTED of committing such horrendous murders…”

Why not simply say “…disbelief that I murdered anyone…”? And why even bring up media at all, especially via the expression, ‘media reports’? If I were going to say it at all, I’d simply say ‘on the news,’ but it is entirely superfluous given its assumed they had to know by one means or another… unless one is writing in knowledge that there WILL BE breaking news, and that writer is used to describing news as ‘media reports.’ That is exactly the way Cops and others who must at times cite news sources, including myself, would be used to saying it. Its use implies a different writer, one with foreknowledge of future events. Sure, Dorner is also a Cop, so he might write it that way, too, except that…

In like manner, the choice of the word ‘suspected.’ If you know you did it and are taking credit there on the spot, why use that word at all.

If written instead by another Cop framing Dorner, that Cop would be so used to referring to third-parties as suspects, and expressing ‘facts’ in certain ways, that it could have easily crept into typed text without notice. Someone writing about their own actions is not so moved. These are not the only instances, and more to the point, they only exist in select parts of the text, nowhere in what appears to be the main body (next three items) clearly written by Dorner.

3)   In the middle of the main body, the accusations against LAPD, we find a curious out-of-place section, a very large paragraph, of zero relevance asking journalists to review his school years (he lists towns he lived in) to show he was never a bully or got into fights.  And yet, the same paragraph describes an incident with him throwing the first and only punch and getting punished, and about continually earning more such punishments thereafter. Excuse me? It is as if someone wanted journalists to deduce the opposite of what the paragraph claims to want, and deem him not only violent minded, but mentally incompetent and unable to distinguish between the two states of being. It had to have been ADDED to get there in the middle, given a lack of context to prior or following material.

4)   The passage is one of only two sections, which use profanity. It is also the one place where he derides Christianity and claims not to be a Christian, though elsewhere he presents his morals in very Christian terms. Now, I’ve read many documents similar in nature where the author was non Christian, and they made negative comments at every opportunity, not at just one point.. So I must ask:

Could this section have been inserted, and ‘addressed’ to journalists because, a few paragraphs later, Dorner also asks in the main body that journalists review a particular set of events and specific records which validate his LAPD accusations? By sounding completely bonkers and self contradictory in the first request, the second request would likely be ignored as well. This is essentially the whole de facto effect (and purpose?) of the entire ‘manifesto.’ It screams ‘ignore anything I say or complain about, because I do the opposite of what I say and am worse than those I complain about.’

Funny thing is… the nature of sociopathic and psychopathic behavior specifically includes the ability to well hide it, rather than to reveal it unknowingly — which requires them to be immune from doxastic self deception (i.e., saying you do not get into fights, then citing fights, and not sensing the paradox). Someone deliberately created that paradoxical paragraph.

5)   From that point forward, it seems as if almost every paragraph of the remaining main body text has at least one sentence, or even a whole paragraph (added?) which tends to convert it from a rational, non threatening letter into a reprehensible, irrational threat. You literally feel the tone change between what came before, and the additions. I get the distinct impression someone started by adding the final section (described next) at the bottom of the document, and then worked their way up paragraph by paragraph, editing for an I-am-a-mad-man-so-kill-me-quick effect, and stopped with the middle insert we just reviewed. Save original passages, most are tacked onto the end, because that’s the easiest thing to do, and they are often very simple, short one liners — but an original writer would tend to include such key elements throughout the dialog and thoughtfully so.

Example a) I have exhausted all available means at obtaining my name back. I have attempted all legal court efforts within appeals at the Superior Courts and California Appellate courts. This is my last resort. The LAPD has suppressed the truth and it has now lead to deadly consequences. The LAPD’s actions have cost me my law enforcement career that began on 2/7/05 and ended on 1/2/09. They cost me my Naval career which started on 4/02 and ends on 2/13. I had a TS/SCI clearance(Top Secret Sensitive Compartmentalized Information clearance) up until shortly after my termination with LAPD. This is the highest clearance a service member can attain other than a Yankee White TS/SCI which is only granted for those working with and around the President/Vice President of the United States. I lost my position as a Commanding Officer of a Naval Security Forces reserve unit at NAS Fallon because of the LAPD. I’ve lost a relationship with my mother and sister because of the LAPD. I’ve lost a relationship with close friends because of the LAPD. In essence, I’ve lost everything because the LAPD took my name and new I was INNOCENT!!! Capt Phil Tingirides, Justin Eisenberg, Martella, Randy Quan, and Sgt. Anderson all new I was innocent but decided to terminate me so they could continue Ofcr. Teresa Evans career. I know about the meeting between all of you where Evans attorney, Rico, confessed that she kicked Christopher Gettler (excessive force). Your day has come.

Example b) Chief Beck, this is when you need to have that come to Jesus talk with Sgt. Teresa Evans and everyone else who was involved in the conspiracy to have me terminated for doing the right thing. you also need to speak with her attorney, Rico, and his conversation with the BOR members and her confession of guilt in kicking Mr. Gettler. I’ll be waiting for a PUBLIC response at a press conference. When the truth comes out, the killing stops.

Example c): Those Hispanic officers who victimize their own ethnicity because they are new immigrants to this country and are unaware of their civil rights. You call them wetbacks to their face and demean them in front of fellow officers of different ethnicities so that you will receive some sort of acceptance from your colleagues. I’m not impressed. Most likely, your parents or grandparents were immigrants at one time, but you have forgotten that. You are a high value target.

6)   The next, closing section is a long list of ranting which, along with a concentration of profanity, is a bit of a grab bag. It is unusual in that it has countless little paragraphs aimed at a wide variety of public figures in a bouncy mixture of complaints and praise which render the writer a loon. Also in the section is a kind of long train wreck of a letter to LAPD, with dire warnings of impending violence towards other cops and their families. Much of the letter portion, if one again discounted sentences and portions which might have been added to flip meaning, may indeed have been written by a sane Dorner, a genuine plea to do the right thing, with additions again subverting them into threats. That is not how threatening people write. The nastiness is pervasive, not tacked on neatly. Sans such additions, it is no longer a train wreck, nor rambling.

7)   These added things tend to be in the same style otherwise questioned in the opening examples, but with more Angst and vileness.

Example (not a typo by me) regarding killing cops; It was against everything I’ve ever was.

Wait a minute. There is a difference between me writing about me; “It was against everything I’ve ever been,” or about someone else; “It was against everything he ever was.” Those are the only two possible original sentences. Either there was a super-nova brain fart, or a partial correction was made to the later sentence. Let me explain.

Imagine someone other the Dorner subliminally mixing thought states from first to third person as well as from relating life experience of the living to past experiences before one’s death. So ingrained as natural to repetitive writing about third parties (in Police reports?), perhaps, that only a partial editing correction (‘he’ to ‘I’ve) was made, the writer still not catching the tell-tale ‘was.’ Either or both reasons for the error make it someone other than Dorner doing the writing, and further implies Dorner already dead, or sure knowledge he was to be, soon.

8)   Nothing in the document would convince you Dorner was crazy as much as does the letter component. When I say rambling, I mean a completely different visible style of sentence structure (or lack thereof), with gross errors not common to the main body. Among them, are incomplete or nonsense sentences, such as the very last one, “We need to hold ou” What? The Cops were at the door and he had to stop mid-sentence and fetch some beers? And yet, again, these sentences/passages are mixed in as if additions to existent, logical, well written material. Take them away, and it suddenly seems normal.

9)   And what about depression? He ‘admits’ suffering from it in the letter part. Funny thing about that is, it always seems officials in questionable deaths of the politically incorrect find a way to say ‘We had indications he was depressed…’ when they ‘suicide.’ Perhaps, but that still only accounts for the murders if he was on psychotropics, for which nothing else matches the symptoms, and still leaves the document flawed in its present construct.

10)  But also in the section is a very long rambling bit which seems to be there only to serve gun grabber needs, and given that Dorner is (allegedly) now one of the ‘mass shooters’ of late, we can expect it to be one more log on the fire in that debate. How convenient.

But, uh… what should we expect, given that the section also praises the likes of both Clintons and Sr. Bush, as well as CIA’s (or Mossad’s) journalists of choice (links reveal), Walter Cronkite (Who wrote this? WC retired when Dorner was three years old!), Peter + Jennings, Anderson Cooper, and Wolf Blitzer, et. al? A Globalist’s Cop who likes a controlled media — who owns all manner of firearms, which he lists, and yet wishes were banned, and which are on Feinstein’s list, too? Please. No propaganda here, move along…

Was Dorner framed? Who wrote Dorner’s manifesto? Was dormer killed and his body put in the cabin?

Conclusion

Given the dichotomy and logic and style flipping content overall, one might choose to toss off the concerns I’ve stated and to instead presume it at simple face value as the work of a lunatic. Heaven knows media is accepting it, so why shouldn’t we? We will actually answer that question, in another blog in this series.

For me, because there is no hint of a specific or consistent lunacy… because nothing in the document as it sits should make any sense even to a deluded writer… because of the clues of alternate author additions cited… we might do well to question authenticity. If NOT authentic, then there is a conspiracy, and nothing we’ve heard about any event related to the matter can be trusted to be true. So, presuming there is a motive to decieve, is there anything suggesting means and opportunity, for someone to make such changes to Dorner’s words? Lets ask a couple of key questions which address that:

1)   Where did the ‘manifesto’ come from?  Answer, from a Facebook page the LA Times describes as “believed to be Dorner’s.” Huh? Three problems with that:

a) wishy-washy ‘believed to be,’ makes me wonder all the more about authenticity. I have doubts, because…

b) anyone can get a Facebook account in any name they want not already taken, and…

c) anyone who has ever had a FB account should know how easy they are to be hijacked, hacked, or accessed and manipulated by unauthorized users via password cracking. Ergo, next question…

2)   How secure were Dorner’s computers and access to his Web accounts? Answer, from his own documentation of LAPD targeting for being a whistleblower; Thaniya Sungruenyos, an LAPD Officer had hacked his Los Angeles Police Federal Credit Union account from her home address, per the IP address provided by the Financial institution. LAPD ignored the evidence and covered up the event, according to Dorner.

Interesting what you can learn, when you question the official line and look more closely. Seen anyone in media following suit? No? Well, that leaves just you and me conspiracy theorists, I guess. But then, there are other people who wonder, too. Check out the last two related articles about Dorner, one of them a Police Chief.

What is the truth about Chris Dorner?

Next up: Dorner, the Urban Legend: Implications Behind a Fraudulent Manifesto

Is Dorner really dead?

Confirmed: Interview on Mass Shootings: Absolute Patterns Prove NWO Conspiracy


Join me on an interview on Urban Warzone in a new timeslot: Thursday, the 31st of January at 1:PM EST to be startled with answers to troubling questions about the images herein.

Note: Cyrus has confirmed the new time slot IS indeed 1PM EST. He has simply not been able to yet update his 
 
Update Jan 29: Reconfirmed and posted actual time/date. Announcing that a special image will be added to this page while on air, and removed afterwards. That image will be used to explain how the remaining graphics herein were arrived at, as well as highlight the differences between relationships between parties in the ‘official’ media/government version of a mass shooting (Aurora) and the result of private investigations in multiple states by myself and assisting field investigators. You can’t imagine how revealing it is until you see it for yourself. But its complexity goes beyond the ability to well explain in the blog and thus it will be subsequently removed. Your ONLY chance to see it is to join us LIVE, though you will be able to listen to the verbal dialog later once Cyrus posts it – sans image.

That’s the day after this post: we will explain how the following graphics came to be and how they prove that mass shootings are part of a long-term plan to establish the NWO. Tune in and participate live, and have this blog post open.

Reading this post you will learn…

• That virtually all mass shootings are not random events, but part of an elaborate plan with multiple patterns only possible by intelligent design;
• That these patterns manifest in many ways, including the ability to generate complex graphical images of mystical and satanic symbols on maps;
• That individual key shootings (i.e., Aurora, Sandy Hook), have additional patterns of their own, all playing to a larger North American pattern of like construct;
• That patterns can be so accurate as to predict likely future shooting events.
 

This matter is too complex for a mere blog. Therefore, I will be going on air to explain more usefully, referring to the images in this blog for purposes of illustration of key points. Please review the images below and read the questions posed for each, questions which I will attempt to answer on air. Then join in the discovery, live, at Urban Warzone.

I will also be preparing a PowerPoint which I want to make into a video. Listen to the show to learn how you can not only get a free copy when it is finished, but also, a free copy of my book, Fatal Rebirth, which predicted this eventuality in the first place more than ten years ago. It also happened to predict Sept. 11 attacks, and much more.

As you review, keep in mind that random events do NOT form geometric patterns. Official Pattern Dispersal Studies by the militaries of many governments around the World investigating UFO sightings have proven that. Not one single instance reported of finding even three points in a perfectly straight line, much less forming right angles or shapes. Yet in analysis of mass shootings hundreds of miles apart, it is possible to find many in a line (and many lines form very complex 3-D shapes), and in some cases (where information details allow), accuracy to within 25 feet, and with doorway-t0-doorway accuracy.

The first question is (but among the last, perhaps, to be answered), why is it that all such plots ONLY work with such accuracy when doorways or driveway entrances are used in the plots? That alone implies intelligent design, does it not? Read on…

Quadrants

IMAGE ONE: The NWO movement is sponsored from Europe via Masonic Mysticism and Satanism

How is it possible that these ‘quadrant’ lines were discovered by patterns associated with just five shooting events, and yet, confirmed by many dozens more such events? How do they relate to the Illuminati NWO movement, and what additional discoveries can they reveal?

Compass Rose

Image Two: The Compass Rose (also CIA’s Logo) is an important Masonic emblem. There are seven, here

How is it possible that investigation of facts surrounding the Aurora Shooting led to an ability to locate and plot this graphic? How does it relate to Masonic Mysticism and why is it not pointing North? How is it that six more real-world roses in the Denver Area have intricate relationships to the shooting, as well (blue, purple, red, yellow lines)?

Masonic Emblems, Maltese Cross

Image Three: Some more traditional Masonic symbols created from data points associated with the Aurora shooting

How are these (and other) Masonic symbols revealed by information drawn from the Aurora shooting? How can random events possibly generate such patterns unless by intelligent design? What process was used to discover them? Who is behind it?

All Seeing Eyes in Denver

Image Four: Perhaps the most meaningful of Masonic Emblems, these point toward a future terror event well beyond 911 scale

How does it happen that two large real-world structures would be discovered to relate to these famous Masonic emblems and point to a future terror attack? How are they interlocked, and how might their intentional existence and relationships verified in other ways? How does it relate to and predict terrorism? How is the terror event tied to mass shootings?

Baphomet in Denver

Image Five: Baphomet (one name of the symbol, and one name for Satan); an upside-down 5-pointed star

What is the significance of being able to plot this symbol from shooting data points? Why is it not perfectly upside down (normally to be aligned to North in ceremonies)? What are the significances of its structural elements in black magic?

Masonic Emblem and Baphomet in Sandy Hook

Image Six: Sandy Hook is no different than Aurora with respect to finding symbols, and yet, it is quite different

WHow is it possible to get symbolism out of Sandy Hook when there were far fewer data points (actually, answer is found in the next set of images, and by the text labels in this image)? Why is the Pentagram tipped the other way?

Sandy Hook in Gotham City Map

Scan of actual Gotham City Map used as PR piece for the movie; Sandy Hook at bottom

Gotham City and real Sandy Hook Compared

Image Eight: The Dark Knight Rises Gotham City Map compared to real map of Sandy Hook has many shape alignments

Gotham City and real Sandy Hook compared

Image Nine: Even more details have relationships to things found in the real world at Sandy Hook

Gotham City real world Sandy Hook compared

Image Ten: And even more details upon close inspection

Why are there so many curious matches between the movie showing a fictitious Sandy Hook when James Holmes opened fire and the real-world Sandy Hook? Why bother to have such elaborate symbolism in a conspiracy in the first place — why not just worry about event planning, alone?

Note: the name matches in blue and red texts do NOT represent any reason to presume any conspiratorial relationship between persons or businesses, but merely represent someone using them as landmarks for their ‘secret’ machinations. Also, the three features at the school are not ‘front’ and ‘rear,’ but at the sides. The Shed happens to belong to the Masonic Lodge. The small dot at the school is not actually ‘in the real world’ as such: it is a cement pad in the shadow of a tree which, in Google Earth, provided the visual of a round black shape presumed to exist (we must assume) by the planners. Or, it relates to something intended in the shooting plan for which we yet have any details, or which failed to take place as planned (e.g., where Lanza was supposed to die).
 

Masonic Emblem at Sandy Hook

Image Eleven: Masonic Emblem ‘mowed’ into the field abutting Gene Rosen’s Property

Why does Gene Rosen have a Masonic Emblem hidden amongst ‘random’ mowing patterns in what is effectively his back yard (though ownership has not been established)? Why does his story change so many times? Why would a bunch of kids and (one version) a bus driver go PAST the Fire House to get to his house when CLEARLY, there would have been BETTER SAFE HAVEN and some hope of getting help found at the Fire House?

Mass Shootings reveal North American Baphomet

Plotting all national mass shootings allowed finding this emblem covering North America.

How did plotting the location of all ‘random’ mass shootings enable discovery and plotting of this Baphomet? Why is it slightly imperfect?

Note: The distances involved do impact accuracy because of idiosyncrasies in Google Earth plotting tools. The smaller the distances, the more accurate you can be (to a point); Sandy Hook was accurate to within 20 feet or so, Aurora (much larger scale) to within 50 feet or so. Despite the vastly larger scale, here, accuracy is less than Google Earth would allow, with several tens of miles in error where perhaps hundreds of feet should be the maximum error. There is a very interesting probable reason. 
 

Statistics Prove Gun Control No Solution; a Political Ruse


Statistics prove gun control is no solution; gun violence is a political ruse.

Taking away guns does not stop psychiatric care-sponsored killings: pseudo science and drug industry profits are the real killer

by H. Michael Sweeney, copyright © 2012, all rights reserved. Permissions to duplicate in full with all links and credits in tact hereby granted, provided they point to proparanoid.wordpress.com and include this notice.
Was Sandy Hook Shooting a multiple shooter conspiracy?
Updated 4/10/13: Proof media and government don’t want you to know the truth and employ disinfo tactics instead, re ‘gun control.’ Changes and pointers to related material indicated with RED TEXT.

Reading this post you will learn

1)   Statistics show the worst shooters are victims of mind altering drugs given under ‘psychiatric care’ with poor or no supervision;
2)   They also show that when denied access to guns, people find more gruesome means to kill, even in mass murder;
3)   That such drugs have a history tied to CIA mind control research in a class I call mind control enabling psychotropics;
5)   That the ONLY winner in gun control is tyranny.
Who is lying about the guns used in Sandy Hook, and why?

Official portrait of George H. W. Bush, former...

Official portrait of George H. W. Bush, former President of the United States of America. (Photo credit: Wikipedia)

Portrait of DoD Mr. J. Danforth Quayle, Vice P...

USAF portrait of Vice President J. Danforth Quayle (Wikipedia photo)

Update: The mass murder attempt in Texas yesterday employing a knife and response by media proves a couple of key points regarding the validity and reasons behind gun control efforts. Additionally, Mr. Sorento, Presidential pretender, is blindsiding Congress and the public when he gives speeches on gun control.

1) There are a rash of ‘copy me’ mainstream news articles using the same exact text/images/headline claiming that mass knife attacks are RARE according to experts. Other media have at least reworded the same message, but remain parroting an official line. This is blatantly false as the statistics show, below, marked now in Red. This blog has cited more than 20 examples of mass murders or attempts using weapons other than guns, specifically to point out that taking away guns does not stop murderers.

2) Other articles and news sources (TV/Radio) are trying to spin the knife attacks in support of gun control by offhand remarks such as ‘If he had used a gun, there would have been more deaths.” Perhaps so, but who is to say his intent was to actually kill — else he would have chosen a weapon with a longer blade. More to the point, if students had been allowed to conceal carry, HE would have been dead with reduced bloodshed of innocents.

3) Sorento gives his speeches before a 100% manufactured crowd of supporters with absolutely no opposing viewpoints allowed, This gives the illusion that NO ONE in their right mind could possibly disagree. This is result of his illegal quashing of 1st Amendment Rights by signing the so-called Federal Buildings and Grounds Restrictive Act. This Law allows Police to eject, even arrest anyone who protests on government property or anywhere near events where government officials are appearing publicly. This is nothing less than subtle disinfo blind siding. End update.

Arguing to take away guns ‘that have no use to a hunter’ is to ignore the fact that the 2nd Amendment has nothing to do with hunting, and everything to do with insuring government does not abuse their power over the people. It is intended to be a form of checks and balances to tyranny, and nothing less.

We clearly need it now more than ever, given the rapid loss of freedoms to government’s paranoiac response to ‘terrorism,’ a crime of questionable attribute, at best, and one which kills fewer Americans than results from wrongful deaths at the hands of law enforcement.

My idea of gun legislation, therefore, is to give me the right to pack a government provided SAM missile launcher and Apache helicopter, not merely some bolt-action rifle I pay for at my own expense — in part because pistols and single shot rifles do little to deter soldiers able to pick you off from a distance with their sniper rifles… and DHS is spending billions to stockpile enough ammunition to kill everyone in North America, including some 9 million rounds of sniper bullets. I have to ask why, and fear the answer is the T-word.

Why does the government want to take your guns away? Martial Law is why.

Lets be clear

No one wants to take away from the legitimate concerns of victims of senseless murders of innocents as underscored so horribly in the recent rash of mass shootings. It is right to be angry and to grieve with introspective analysis and to seek a solution to prevent such heinous acts as so painfully evident in the massacre of children and adults in Connecticut. And all Americans and people elsewhere in the World are victims, too… we all are forced to suffer some lesser anguish in our compassion for those who lost family members and friends in these events.

But please, do not become yet another kind of victim by taking the bait and blaming guns, not even a particular kind of gun, especially when inconsistencies and the very nature of official statements of evidence suggest either a conspiracy of shooters is being foisted upon us as yet another ‘crazed lone gunman,’ or lies are offered in a conspiracy within government to force gun control upon us… or both.

How, for instance, in Sandy Hook, is it possible for the Coroner to cite to media with law enforcement at his side that everyone was killed by a rifle, when State and local Police had already stated that only handguns were found in the school with the shooter’s body (first, two, then four pistols), and the only rifle found was in the shooter’s locked trunk?

There are other questions, but not as many as found in Aurora’s theater shooting. These kind of nagging ‘conspiracy theory’ questions for which the public deserves to have answers are always ignored, of course, because, ‘they are merely conspiracy theorists’ doing the asking… even when persons of credentials ask. Thus the truth, including the real cause of ‘gun violence,’ is never explained.

Why are there so many ties between Sandy Hook and Aurora?

Right in front of our eyes all along

And yet, the real cause has been right before your eyes the whole time, but deliberately veiled by corporate and government forces allied for varied agenda. I first wrote about the problem in my book, Fatal Rebirth (a four volume look at crimes of the New World Order which predicted Sept. 11 attacks, an assassination attempt which took place, and mass shootings of the kind we face, now, and so much more). I also wrote about it in my books on Political Control Technology, such as MC Realities.

A ten-year research effort for these books, as well as personal family experiences, made it all-too-clear.  It is subsequently verified by statistics and other information you can easily verify for yourself: the real culprit is a thirst for power and control, both financial and political. Their weapon is disinformation, and chemicals. As such, then, it is imperative that we look both at mass shooting events as well as political assassination events; both being used to effect political change against the natural will of the people and course of governments. It is, after all, yet another form of mind control for the masses: change the mood and the will of the people with lies.

Are mass shootings sponsored by the CIA or military?

Start with the Congressional Record

If you are closed-minded about the possibility of mind control and see it as mere tin-foil hat nonsense, then you are already a victim of CIA’s Operation Mockingbird, and should skip this section because you will not wish to be confused by the facts. It might even be harmful to your psyche to learn you have been manipulated by a form of mind control called disinformation, aka propaganda. Mockingbird put thousands of CIA agents directly into media at all levels from management to reporters and anchor persons… to make sure you got all the news that’s fit to distort.

The Church and Rockefeller Commission findings of the 1970s regarding CIA mind control research further revealed all manner of inhumane MC research and non consensual testing on unwitting human subjects. It is clear that among even worse atrocities, CIA was keen to develop drugs that could control a person’s mind to the point that they would do anything commanded, even to kill themselves or others; the Manchurian Candidate, or ‘programmable person.’

There is much more I could write on this topic, but I do not wish to cause readers not open to the notion to stop reading, for there are more important things yet to discuss. I suggest Alex Constantine’s book, Psychic Dictatorship in the USA, for those wanting the gory details, and my book, MC Realities, to learn about the development of psychotropic mind altering drugs (mind control enabling drugs) by Eli Lilly under ex CIA director George Herbert Walker Bush and Dan Quayle as company executives… the very drugs we are about to see quite tied to the type of gun violence of which this article speaks.

When media controls what you think, you are a victim of mind control

Gun violence: Look at the Statistics

The first mass shooting of note in America was the Texas Tower sniper murder of 13 at the University of Texas, Austin, in 1966. From that time forward there have been countless incidents, so many, in fact, that media hardly thinks to look at the big picture, all-too preoccupied with the gory details of the most recent events. Convenient for them and government, perhaps…

…as it does not serve hidden agenda if you compare today with yesterday and learn that there is a pattern of significant relevance which is clearly being withheld from you. You make your decisions based on the colored view of blood-red tinted glasses fitted with blinders of ‘current news.’ There is a reason I call it the Military-Industrial-Intelligence-Media Complex. What makes you think ‘free press’ has anything to do with American media, a media largely controlled by less than a dozen people, exactly as the Congressional Record cited to be all that was needed to control the press. The statistics will reveal it all…

SSRI medication was developed by CIA as a mind control enabling drug

What mass shootings and assassination events have in common:

It is so rare to find otherwise, that I dare say every such shooting has many, if not all, of the same key ingredients in place: a) prior psychiatric care involving the use of prescribed mind-altering drugs (pscyhotropics, generally of the SSRI variety — Selective Serotonin Reuptake Inhibitors such as Prozac, Zoloft, Paxil, and dozens of others); b) a triggering event based on emotional stress or trauma or the curtailing of or failure in treatment processes, such as failing to take medication or overdosing; and in all-too-many cases, c) the otherwise ‘coincidental’ peripheral presence in their lives of military, CIA, or other persons, firms, or organizations associated in some way with mind control technology.

Note: there is another kind of triggering event for the Machurian Candidate style of programmed shooter, the kind of person used as a disposable patsy, because they tend not to be very effective as actual killers. The best example is, perhaps, Sirhan Sirhan, who emptied his gun at Robert Kennedy but hit him, not, according to modern forensic review: Kennedy was shot from behind, and upward. Such persons are programmed in advance to do a specific thing upon hearing or reading a select unusual triggering phrase.

Such phrases are offered once to cause them to pay attention (throws a mental switch). It is then subsequently repeated twice close together to cause them to carry out the instructions (initiates a command sequence). Interesting, then, that in Sandy Hook, that a particular Web set published the following phrase three times, once as title, and twice in the text: “Sandy Hook Lingerie Party Massacre.”

This was published on the same day as the Aurora shooting, in which the film, The Dark Knight Rises, shows a map of the villain’s attack plans with Sandy Hook (a district of Gotham City renamed to Sandy Hook for the film, for some unknown reason) as the place next to be struck. And yet, it is strange things like this which get us conspiracy theorists labeled as ‘nuts’ by media that you might be more comfortable in ignoring us, instead of thinking for yourself. How comfortable are you, right now?

The rush to gun control serves the NWO agenda for a one World government

SSRI drugs cause violent thoughts and deeds as side effects

SSRI drugs are killers, both by suicide and by murderous acts committed by those taking them. There is a remarkable summary of this phenomenon at ssristories.com, a Web site which just a few years ago listed perhaps only 50 or 60 examples, but today cites about 5,000 cases which illustrate the problem. The link sorts them by the general nature of the case, but you can sort by date or location, or any other heading.

A quick review reveals some startling examples, which I shall first outline in terms of the dangerous aspects of the drug class and its propensity for sponsoring unchecked violence in patients, and then more specifically relate to mass murders and assassinations, gun violence ahead of other forms of murder.

Why do ‘scientists’ and ‘doctors’ of excellent educational qualifications fail to realize, in light of these known side effects: every physical person has a unique physiology, DNA, and dietary makeup, and thus, it is impossible to predict the results of a given infusion of chemicals into a body where, especially in the brain, the EXISTING balance of chemical makeup is not prepared to suffer alterations with kindly result. Why then, do they persist on guessing at initial dosage levels, and then upping the ante when results are not deemed adequate, until side effects make it clear the med will not help, and then switch them to another med, and start all over again? It is witchcraft-level insanity, and it is guaranteed to have negative outcome.

It is NOT science, nor is it MEDICINE.

It is important to realize even this massive list is only a tip of the iceberg. It ONLY represents reports by family members, doctors, organizations, and other select researchers who were examining and reporting purely from the medical viewpoint. Further, as many of the reports are voluntary contributions, it represents only reports from people who happened to learn of the Web site’s existence and who were moved to report, and, moreover, is limited to reports from people who came to realize the relationship of events to the drug. For this reason, you will not find mentions of assassinations of note, such as my research indicates should be included (name ANY assassination attempt in modern American history, and you will likely find it true).

Among the reports (and a couple of details from my own research) we find court rulings and law enforcement investigative findings which frequently place the blame squarely on the drugs, and not the violent person, in some cases causing the courts not to elect punishment — even for capital crimes involving death. Here is your summary of drug induced violence:

Suicides are very convenient in a conspiracy

Let’s talk suicides:

1)   Over 250 reports involve suicides only, and many times that number include suicide as aftermath to other violence, such as arson, murder, and so forth. Suicide is almost the norm after such drug-caused violence;

2)   One attorney reports he has had a total of 73 calls about suicides from just one specific SSRI;

3)   Indiana county study shows 41% of all suicides involved SSRIs

4)   Wisconsin study shows 54% of teen suicides involved SSRIs

5)   Sweden study shows 52% of women suicides involved SSRIs

6)   Report shows US military suffers 18 suicides a day, 40% on SSRIs

7)   Multiple reports of suicide pacts where all participants were on SSRIs

8)   Another 200 questionable deaths listed which may have been suicides.

9)   EVERY SSRI lists suicidal thoughts as a side effect

10) Suicide attempts often involve the most painful and horrific, and least effective means, such as blow torch, grinders, etc., or the most illogical, such as trying to jump out of an airliner, or stripping naked and wandering off into a winter wilderness.  Suicide by Cop is quite popular, as are head-on and other fatal car crashes, for which statistics are likely quite under reported.

Manchurian candidate murderers are always ruled as acting alone

Let’s talk murders:

 1)   Over 1,200 reports of murder attempts, about one fourth of them followed by suicide or attempts;

2)   Within one week of returning home, nearly a dozen soldiers on SSRIs killed their wives;

3)   Methods vary widely: when guns were not available, almost any means might be employed, including additional reports under other categories, such as vehicular homicide, arson, and so forth (roughly another 100 cases). Details follow.

 Conspiracy must exist if there is a cover up in place

Of interest (or no interest, really) to TSA and FAA:

1)   Nearly two dozen incidents involving violence on an airplane or at an airport;

2)   Individual reports of eleven private plane crashes killing 24 people blamed on SSRIs;

3)   Airline Industry study reveals 100 crash pilots using SSRIs;

4)   At least one hijacking was initiated by an SSRI user.

 No one goes ‘crazy’ without some triggering event – contrived or coincidental

How about kidnapping and hostage taking?

 1)   About twenty instances linked to SSRIs;

2)   Seven instances involve schools and students as victims.

 When you hear ‘lone shooter,’ think ‘conspiracy cover up.’

How about arson and bombing?

 1)   80 arson events, three involving schools, two events where school administrators on SSRI set fires at home;

2)   35 bombing instances, two involving schools.

 CIA lies to put their own men in post of Chief, Spokesperson, and head of Internal Affairs

Other Killing Sprees?

 1)   Remember the rash of US Postal Worker rage shootings? Most were SSRI;

2)   About two dozen instances of fast food chains, trains and busses, churches, banks and other offices, and even a country club and a nursing home;

3)   More than 30 incidents at schools, about 1/3rd of which were SSRI, including virtually every event which made national or international news;

 Gun control is a codeword for police state control

And when there is no gun available?

 1)   One 17 year old holds 20 children and teacher hostage at point of a sword. So if you take all the guns, better get all the swords, too;

2)   A Mother attacks her son with a sword. See what I mean?

3)   School day care center looses two children and an adult to a knife attack. After all, knives are just short swords, right? So, if you are going to take away larger gun clips, but not small, then we presume you would take swords, but no knives. What did you gain?

4)   A woman laughs as she uses her car to chase down three kids at an elementary school. Alright, so now no one can own a car, right?

5)   Man attacks 11 kids and 3 teachers with a machete. See what I mean?

6)   Numerous fires started with intent to kill people in apartments, stores, offices, and schools. Starting to get the idea?

7)   The johnstonsarchieve.net Web site lists these additional incidents (scroll to events with ‘criminal’ cited instead or ‘terrorism’) with no known tie to SSRI drugs, but are cited here because the killers had no guns:

    1. Bath Michigan man uses dynamite to kill 40 children, himself, and the School Superintendant over inability to pay school taxes causing foreclosure of his farm. So if you take all the guns, better also take all the materials used to make explosives;
    2. Poe Elementary playground attacked by man with bomb in suitcase killing himself, his son, the Principal, a custodian, two other students, and injuring 17 other children. See what I mean?
    3. 63 students and adults were burned to death by an angry student at a school dance in Goteborg, Sweden (gun control in Sweden is strict). So if you take all the guns, better take all the gasoline and matches;
    4. 67 teen students died from an arson attack on the dorm at Kyanguli Secondary School in Machakos, Kenya, injuring 19 others. See what I mean?
    5. The Elementary School of Ikeda, Japan, lost 8 students and another 13, including two teachers, were injured by a man with a kitchen knife (there is total gun control in Japan);
    6. 72 kindergarten students and teachers at Zhanjiang City, China, became dangerously ill from rat poison put in their salt by a competing school operator (there is total gun control in China). So now there can be no household poisons?
    7. That same year, 2002, two men upset with contract provisions with Number One High School in Changed, China, put rat poison in breakfast food making 195 children and teachers seriously ill. See what I mean?
    8. Two years later, Number Two High School in Ruzhou, China, suffers an attack by a man who kills 8 and injures 4 students with a knife while they sleep in three separate dormitories;
    9. And yet the next year, a man who had lost his job, again in Zhanjiang, attacks several Nansoon Middle School students with a kitchen knife, injuring 8;
    10. In Jikari High School, Yamaguchi, Japan, a student threw a homemade bomb made from nails and emptied firecrackers into a classroom, injuring 58 students and the teacher. Might as well do away with the 4th of July celebration, anyway, since you are getting rid of the Constitution and Bill of Rights;
    11. In 2010, a man killed three students, and a teacher, and injured 20 other children and staff at the kindergarten of Zibo, China, once more with a knife;
    12. Another machete attack took place in the 5th grade class of the Talisayan Elementary School, Xamboanga City, Philippines, killing one student, a teacher, and a grandfather of a student, and injuring 4 more students and two teachers (gun control in the Philippines is near total);
    13. If you wish more examples, there are thirty more at the bottom of this wikipedia link on list of rampage killers, including at least two alleged deliberate crashing of passenger jets. So let’s put TSA and the FAA out of work and ban aircraft. After all, you do want to protect people from violence, right? That really IS your motive for taking away guns, RIGHT? Sorry… I didn’t hear your answer.

 If you do not own a gun, you do not own your government

And what about when other citizens nearby ALSO have guns…

…the guns they want to take away from you and me? The news of such events that does not make endless headlines because it does little to support gun control wishes of those who seek total control over an unarmed public? A mention the day it happens is as good as it gets, as a rule. Thanks for much of this compilation by gunwatch.blogspot.com:

 1)   A 1995 mass murder for drug effort was spoiled in Muskegon, MI, when the store owner, despite being shot four times in the back, managed to use his own gun to scare off druggies who had planned to kill everyone in his store;

2)   A 1997 high school shooting in Pearl, Miss., was halted by the school’s vice principal after he retrieved a pistol he kept in his truck;

3)   A 1998 school dance  for Parker Middle School (Edinboro, PA) shooting saw one teacher killed, and anther teacher and two students wounded before a man living next door forced the shooter to surrender by getting the drop on him with his shotgun;

4)   A 1999 gun shop owner with concealed pistol shot a gunman to the ground who had brought 100 rounds of ammo with him to ‘go out in a blaze of glory’ at, of all places, a shooting range in California (a guarantee he would get his wish);

5)   A 2002 shooting at Appalachian School of Law in Grundy, Va., came to an abrupt conclusion after three had been killed and three more wounded —when two students, unbeknownst one to the other, ran to their cars to retrieve firearms and confront the shooter with threat of crossfire;

6)   A 2005 shooting which started at the Smith County Courthouse in Tyler, TX, and involved high-speed pursuit, was ended because of the intervention of Mark Allen Wilson, who had a legal concealed carry weapon. This one did not end as well as the others cited, herein, as Wilson was himself killed by the shooter, who was wearing a bullet-proof vest. However, the exchange of fire allowed Police who had been kept at bay to end the matter with fatal shots of their own. This was after the shooter had already killed his ex-wife and wounded his own son, and wounded three lawmen in the melee;

7)   A 2007 gunman attempting to kill parishioners of the New Life Church in Colorado Springs was only able to kill two before being shot by an armed retired Policeman who had changed his mind about going to church that day because of a previous like attack on a church in Ogden the prior week;

8)   A 2007 mall shooter in Utah, after killing five and wounding four, was shot dead by an armed off-duty police officer;

9)   A 2008 shooting in an Israeli School (the Mercaz HaRav massacre) was ended by shots from a student and off-duty policeman using personal weapons, who entered the school with such intent after hearing shots which killed 7 teens and one teacher, and wounded ten other students;

10) A 2008 Winnemucca tavern shooting was ended after two deaths when the shooter, while reloading, was shot dead by a patron with a concealed carry permit;

11) A 2009 workplace shooting in Houston, Texas, was halted by two coworkers who carried concealed handguns;

12) A 2009 College Park party was interrupted by two gunmen who counted ten guests and then counted bullets to insure they had enough. After separating the Men and Women one of them started to rape one of the women, but was ‘coitus interruptus’ by shots from her boyfriend, who killed one and drove off the other gunman;

13) A 2009 restaurant robbery attempt by two gunmen Anniston, AL, was thwarted when one of them threatened the life of a patron who was hiding, only to be shot dead by the customer, who had also prepared his concealed pistol for possible use. A few shots were then exchanged with the second gunman, who was critically wounded;

14) That same year, a convenience store in Richmond, VA, was  robbed at gunpoint, the clerk being shot and wounded, and other patrons being shot at before the robber was shot dead by a patron with concealed carry permit.

15) A 2010  Mills, N.Y., shooting incident where the gunman, an angry customer, intended to kill six employees (he had a ‘death list’ of their names) of a cell phone store was, after opening fire on his first victim, himself shot dead by an armed off duty policeman with concealed weapon.

16) A 2012 RV park shooting incident in Early, Texas, was ended by a resident with his pistol as the gunman, after killing two people and their dogs, then held Police at bay with his scope equipped rifle;

17) A 2012 church shooting in Aurora, Colo., was stopped by a member of the congregation carrying a gun.

I leave you with two things, the first being: In Australia, where total gun control has been enacted (confiscation to establish an almost completely unarmed public), in 2011 there were STILL 94,000 shootings that took 29,000 lives… with not one civilian able to defend themselves. In America, the one spot where gun violence is rated worst, oddly enough, is the District of Columbia. Let’s compare:

There, the 2011 death rate by firearms was 12 deaths per 100,000 population, and that’s in a country where gun ownership is 89 guns per 100 adults. Compare that to Australia where it is now roughly 6 guns per 100 (est. by using UK provided figures), where deaths are 131 per 100,000.  Does that sound like gun control works as proponents claim?

To get that information in media, of course, I had to go to England, because the American press won’t tell you the truth about such things. They got their information from FBI, which any US paper or news network could just as easily have done… but actual investigative reporting would not help government take away your gun, would it?

The second is this: Out of 10,650 murders by gunmen in Virginia, only 4 were by persons who had legally registered with concealed carry permits.  Criminals don’t need or seek permits, of course. These four deaths by legitimate ‘gun toters’ would seem somewhat balanced by the fact that there are about as many instances, the most recent being the Clackamas Mall shooting… where persons with concealed weapons elected NOT to use their gun to shoot at gunmen engaged in murder because they did not feel they could safely do so without risking hitting innocent persons in the line of fire, or return fire hitting such persons behind them. That is part and parcel of good gun handling safety training, which all firearms owners should be required to have: my idea of a ‘gun control law’ that might actually work some good.

But personally, I’d rather have open carry… I’d even be moved to wear a six gun and cowboy hat if the 1875 Colt .45 hadn’t been stolen from my family some years back (when I did wear it in public on occasion). Open carry is a silent and untold deterrent to gun violence. In Cuba, there is no standing army, because every capable citizen serves in the Defense Force (like the National Guard), and is issued an AK-47, side arms (many people pack), and even grenades. Result: LOW CRIME, and very few murders by these weapons. The same is true in Switzerland (different weapons, of course), so it has nothing to do with Communism, that it works.

Statistically, in the Old Wild West where wearing a gun was the norm, gun violence was also relatively low… (e.g., the murder rate per capita in Abilene was lower than any modern US city, today). There have probably been more shooting victims in TV and movie westerns than in real life in the old West. When almost everyone has a gun, politeness rules; even when confronting someone in an unpleasant situation, it was done with carefully chosen words.

SIR, I believe that Ace up your sleeve proves you are a card cheat — and the pot is therefore mine, unless you wish to object?” Given the choice, most villains would back down unless the odds were significantly in their favor… which gun control laws will surely provide them, one 2nd Amendment-eroding law at a time.

The Clackamas Town Center Shooter… me, my family, and friends


This one came closer than I’d like to those I love… and requires we make comparisons to Aurora.

Permission to repost if in entirety with all links in tact and credit to author H. Michael Sweeney, and the original blog at proparanoid.wordpress.com
Clackamas shooting compared to aurora shooting

Reading this post you will learn:

a) How the Clackamas shooting relates to me and people I love, personally

b) How it relates to the Aurora Century 21 shooting

c) That like Aurora, there are still mysteries and questions to be resolved

When the Mall finally reopened after the Police investigation, our family all went to the Mall and expressed our moral support. They had a nice Candle light vigil, and there was a group singing Christmas Carols. A lot of people had tears in their eyes, including me. We hung a Star on the tree in Memorial for victims and their families. I wrote simply, “Hope, Love, Faith, Life.”

I also recorded a music segment and sent it as a text message to a dozen people I thought would appreciate it. It ‘spoke’ volumes about coming together as a community and going forward under duress. But as it happens, this event was a bit closer to home, and some of my tears were not just for those reasons, but because of more personal details.

As an author and consultant on privacy and security matters, as well as abuse of power issues including crimes of the New World Order, I should be used to such nastiness by now. I’ve been involved with investigations or other direct confrontations resulting in capture and prosecution a whole range of bad guys, including going head-to-head with terrorists and dirty cops, with three and perhaps five attempts on my life for my trouble. Read about it.

But no. I’m not used to it.

My wife has come home to find Men in Black fleeing our home using walkie talkies. People have tried to break into our home while we slept three nights in a row, and they did eventually gain entrance while we were away and ‘did things.’ I could spend an hour telling you about one man (a Parole Officer) who, with his coworkers and Bounty Hunter friends regular followed us… followed us to a birthing class where we observed him covertly meet with a member of the class who tried to get friendly with us… later identified as a Naval Intelligence Officer.

I was investigating the Flight 800 shoot down at the time. I could go on like that for some time, actually, with endless tales of Men in Black, FBI, CiA, Secret Service, and even one confirmed NSA and MI-5/6 spook. Even today there is the odd event, because I often cross swords with client opponents, often some of those same players. Despite all that, I’m still not used to it.

Aurora shooting compared to clackamas shooting

About Clackamas Town Center

Clackamas Town Center, a few feet from where shooter entered complex (from their site – click)

One of our twins currently works at Sears at one end of the Mall, as did her husband until recently. The other twin works at Penny’s, at the opposite end of the Mall. In the center of the Mall on one side we find the Century 21 theater and its adjacent food court where the shooting is said to have taken place. Opposing this, is Macey’s. Both my Wife and I used to work there… and my Sister-in-law subsequently works there, now.

The story goes this way: on Tuesday, Dec. 11, a young man whom I will not honor by naming, hurriedly left his car in the parking lot and rushed to the Macy’s exterior entrance, dropping at least one ammunition clip as he went. He was carrying an AR-15 .223 rifle almost identical to the one used by James Holmes, and wearing a ‘white mask.’ Once inside, he ran through the store attracting much attention and causing some due concern. About four seconds after running past my Sister-in-law at the Cosmetic’s Department, he opened fire. It was 3:27 PM, according to a cash register transaction at the same instant. Police say there were easily 10,000 people in the Mall at that moment. Shudder.

At 3:27 on the day before, I had been at the Mall, myself. I was in the food court where I struck up a conversation with the young woman who ran a cupcake kiosk at the edge of the food court closest to Macy’s interior entrance… where the shooter would be appearing the next day. Had I had that conversation on Tuesday instead of Monday, I would have observed first-hand the shooter as he skid to a halt and prepared his weapon, and opened fire:

He shot a woman in the chest and killed her, likely instantly. She was Cindy Yuille, a Mother of 54 years who looks very much like my Sister-in-law, and is about the same age. I shudder. He also shot in that same instant a 15 year-old teenage girl, Kristina Chevchenko, who suffered serious injury but is thankfully now recovering. She looks like a neighbor girl, and actually lives within a healthy walk’s distance from us. I shudder. He then turned the weapon on the cupcake lady, and fired but missed. As I could have been there, and had spoken to her the day before, I shudder.

Other shots fatally took down Steven Forsythe, age 45, and Father of two. He was one of those dynamic and widely admired and loved individuals who seemed to be involved in everything good, including being a high school football coach.  He also lived a walk away, and was a personal friend and business colleague to one of my own friends and business colleagues. I shudder.

The shooter, it is estimated, fired some 60 rounds before fleeing and, perhaps at seeing Police were closing in, took his own life. Early in the shooting, just as in Colorado, his gun jammed. By the time he could clear it, most everyone had taken shelter, many into stores where employees were herding them into secure back rooms and locking everyone behind steel grates and heavy fire doors. Kudos, Clackamas TC!

Had their quick thinking and selflessness not been so…  had the gun not jammed… had the shooter been better prepared or not been wearing a mask to partially restrict his view…  had some people been confused by the echoes and run toward the shooter instead of away… I shudder.

Now, please allow me to change directions for making a couple of points. It was not that many weeks ago that one of my most popular blogs was on the Aurora shooting. I wrote it to raise 25 questions no one has asked, any one of which point to James Holmes as a patsy in a false flag terror event. I also revealed specific potential motives for outside parties to be responsible, with proofs of viability.

Aurora and Clackamas shootings compared.

Clackamas and Aurora Have Troubling Similarities

a) both alleged shooters were young troubled men with psychiatric problems (which we now hear again in the even more tragic shooting of 27 in Connecticut). This is a very tired refrain heard time and again in mass shootings, and there are reasons for concern associated with CIA’s MK Ultra and related mind control experiments;

b) both wore all black. One wore a gas mask and, sans mask, was ‘made up’ to more or less look like ‘The Joker,’ while in Clackamas, it was merely a ‘white mask.’ But there is a problem there, too: conflicting reports describe it as three distinctly different kinds of masks, and for some troubling reason, Police decline to confirm WHICH ~ a Michael Meyer’s Halloween Mask; a Jason’s style Hockey player’s mask; or a Guy Fawkes (We are Anonymous… expect us!) mask;

c) both used the same weapon, and AR-15 .223 variant. The weapon jammed and prevented more carnage;

d) both fled to no avail, which begs the question, why bother? Holmes just sat in his car and waited to be captured without resistance, while in Clackamas, the shooter took his own life. Police found him dead, sans reports of hearing or seeing him shoot himself, but why? Why wear a mask, and why run if you were going to kill yourself?

e) both incidents suffered conflicting reports as to the number of shooters seen and their whereabouts at any given point in time, implying a possible coordinated assault. In Aurora, there is considerable evidence this is so, but in Clackamas, at least thus far, we might presume it to be normal confusion causing misconception and mistaken accounts.

f) both took place in or at the virtual doorstep of a Century 21 theater. On first reports on Clackamas, I was very concerned about this particular coincidence, but am less certain it matters, now ~ because the actual shooting began in the area central to the mall at the edge of the food court, and the shooter entered from the opposite side of the complex from the theater. Had he intended to target Century 21, there was an entrance right there.

g) both enjoyed remarkably prompt Police response. In Clackamas, the shooter was not very bright. The Mall is located about one block away from the Sheriff’s Office, which also has a secondary presence right on the Mall lot with about a half dozen cars. In Aurora, the nearest facility was several miles distant and quite away from common arterials.

h) in both, Police were not terribly forthcoming with facts early on (SOP). However, mistakes made by Aurora Police in their public statements (see my post) were not present in Clackamas.

Still, with all these coincidences, I shudder. Doubly so because of the horror in Connecticut, a murderous rampage of which I cannot bring myself to write… except to say that I shudder to consider that three such shootings… four if you count the Sheik Temple shooting in Michigan… all within a window of a few weeks of the same Season… and all on the heels of a United Nations Treaty attempt to ban all firearms in civilian ownership.

Clackamas is a community of people with whom I share a happy existence in a beautiful and generally peaceful setting. Good people. So I shudder at the closeness and ‘what if’ nature of the Mall shooting as it indeed came all-too close to impacting my own family in even more personal and tragic ways. We were lucky. Others families and friends were not.

But I shudder also because all the communities where these shootings took place are like that… and in a country where government seems to be preparing itself for war with its own citizens and, in local preparation, would find any such effort a lot easier if there was some way they could ban all weapons and collect them, first. It is for my me and my family that I shudder, yes. But also, for my country and a thing called the Constitution.

Many people died when those shootings took place. But I fear the Second Ammendment may also be a casualty given the explosion of talk about gun bans as result, especially because of Connecticut… and in thinking it possible…

I do indeed shudder!

TOP 5 Reasons for, Signs of, Methods of, and Solutions for the Internet Spying On YOU


TOP 5 Reasons for, Signs of, Methods of, and Solutions for Internet Spying On YOU

The threats are many, sophisticated, and endless. Solutions need not include PANIC (usually), and are largely simple and inexpensive, though nowhere near being fun.

Copyright 2012, Proparanoid Press, H. Michael Sweeney — All rights reserved. Permissions to reproduce granted on request, only.
Top five reasons for Internet spying
 

English: Frame of an animation by the U.S. Fed...

This article is especially useful to the TI — the political control technology Targeted Individual, and any person who has reason to believe someone is actively trying to snoop their Web activity or who deals in Web activity of a highly sensitive nature.

My approach to addressing security and privacy is not merely talking about the threats to educate, but how to detect if one has a problem, and then to provide a functional solution. It’s one thing to educate, another to illustrate, and yet another to resolve. Only by all three, is the end result adequate, provided there is no failure along the way which impedes.

Reading this (lengthy, but in outline form so you can quickly navigate to areas of interest) article, you will learn:

• There are 5 basic kinds of privacy compromise/targeting to worry about;
• There are (often) 5 symptoms or clues targeting is taking place (when not blatantly clear);
• There are (often) 5 basic methods of carrying out such targeting;
• There are (often) 5 things you can do in defense or response;
• There are some very reliable and free Open Source tools which can help reduce risk;
• There are some new and potent tools for those more concerned or more at risk of targeting.

By way of introduction, I write as published author and consultant, lecturer, on privacy and security matters, abuse of power issues, and political control technology. My purpose in writing goes a bit beyond the obviously important educational issues, or even the somewhat obvious self-promotion of my books. That is because I, with the help of others, have subsequently developed some specific tools and services which additionally address the threat to privacy and security inherent in daily use of the Internet.

One of these is a completely secure email alternative called NeVir Spies, and a new concept I’ve temporarily called Web Walker which provides a totally secure Internet alternative with some very unusual features and capabilites which go well beyond the topic at hand. More on these tools at article end — very informative.

That said, there are many people much more savvy than I on WEB security (as opposed to real-world security problems). So, if after reading this, you want to know more, there is likely better advice than mine out there, especially if you prefer it more technical in detail. This post, however, I’m betting, is the most centralized one-stop reading resource you are likely to find, and it therefore covers more bases, more comprehensively, in general.

And, speaking of ‘general,’ some general advice applies to all Web security issues, ‘in general.’ It’s all common sense, of course, and you’ve heard (most of it), before, but I’d be remise if I didn’t include it here in case you have not:

• Frequently change passwords and if anything odd is going on, change ALL passwords.
• Do NOT use simple to remember passwords based on ANYTHING about YOU, and DO NOT use answers to security questions ABOUT YOU. If you must use simple to remember passwords and face security questions, base them and the answers on someone famous who died long ago, someone random. Then all you have to do is remember their name, and go look it up on the Web if you forget the hard part.
• Avoid writing passwords down, because you should…
• Remember that your computer security is only as good as security of access to your computer. If anyone can get to the computer, there are many things they might do to compromise its security, obtain passwords, etc. If it does not stay with you or reside on the other side of a pickproof lock, it is at some risk.
• REGULARLY run your Norton’s or similar.
• Never respond directly to an ‘official’ email from any account requesting verification of information or asking you to log in using a link unless you were expecting that exact email to arrive. Manually use the Browser to go to the site and log in.
• Never undertake financial transactions or fill out informational forms involving personal information at a Web site unless the url starts with https:// instead of http://. That little added ‘s’ tells you it is Secure by means of several means not present in general surfing.
• Avoid downloading files or programs from unfamiliar sites of questionable repute, especially when they are in other countries and the topic is something you wouldn’t want people to know you were interested in (i.e., porn, drugs).
• Never put a long list of email addresses in the To: or Cc: blanks unless those people are already conversant collectively (do not assume just because you got an email with that long list that this is so). Instead use Bcc:, or you violate THEIR privacy. Tell everyone you email to to never include your email on such a list unless Bcc:
• Never give out someone else’s email contact unless you get permission for the introduction — just as if it were a phone number. Offer instead to pas the email addy of the inquiring party along to the person in question.
• Here are ten more technical things which you should be aware of explained more fully at georgedillon.com, (linked for you, here) as they deserve their own explanations (I especially endorse ‘Do not trust Microsoft products,’ including their operating systems. Historically and almost consistently, in addition to select spying instances of actual on customers by Microsoft itself, they are poorly designed with respect to security issues and hackers/attackers take advantage. They are the primary source of the great weakness of PCs compared to Macintosh for security and reliability, and the reason so many security steps and layers are advised: 
 

Top five reasons for spying on you

5 Top Reasons For the Internet Spying on YOU (etc.)

It happens to us all, every time we use the Web. Most of it is undetected, and generally harmless. Too much of it eventually bites us in unexpected ways beyond our control. Some of it is dangerous, even beyond the draining of checking/savings accounts or total identity theft.

Most of it we volunteer unthinkingly, especially with what we do on social networks like Facebook, which is a giant spying mechanism of great social usefulness to us, and a goldmine of information to corporations and government. Every single mouse click, almost, is giving away information.

Some information we have stolen from us despite the care we think we have exercised, and that would seem to most of us to be rather rare, but I happen to know that more of it goes on than we hear about, and we are often victimized in ways which we do not detect, and do not realized have harmed us, or their potential to do so. Some information is used against us in ways that are part and parcel of further assaults on privacy and security. Read on…

1)   Criminal Financial Gain. Everyone is a potential victim, and we all get shot at in hopes it will be us. Before you can be Phished (tricked into revealing confidential information), they have to know you are an Netizen (a WWW user) and where on the Net you are (your email, social network and Group memberships, etc.). So they snoop you out, and then snoop you for vulnerability (i.e., lack of paying full attention or even gullibility), and then phish you or attack with a virus or similar technical assault; Signs, Methods, and Solutions:

a. You get email from someone you know which promotes (something) which urges you to open a file or take an action, but which is not quite like what they would normally send, and the message accompanying it is overly simple so you can’t tell if it ‘sounds like something they would say.’ This likely did NOT come from them, and means yours or their email account has already been hacked or, far less likely, both theirs and your email addresses were obtained from someone else who was hacked. If you open the item or take the actions urged, you risk your email account or computer being hacked, infected with a virus or similar, or becoming a Scam victim via participation; What to do about it:

i.   Do not take the actions suggested, therein. Natch!

ii.  Contact your friend and advise them their system (or a friend’s) has likely been hacked, with explanation. They should change their Web passwords and run their Nortons or similar. You should do the same (do it regularly, at least). Macintosh users may yawn at this notion, but we are not completely impervious from suffering system issues resulting from failed virus attacks and eventually resulting in unwanted operational inconveniences.

iii. Delete the offending message, unless your friend confirms they really did send it, and you care to follow up with it knowing it actually safe.

iv.  Advise your friend that they should notify everyone on their email list of the situation to insure they do NOT respond to the described message, with apologies if they should have been a recipient.

v.   Contact all your other friends via all avenues (email, social networks, groups, in person) with similar warnings that such a message is dangerous and should not be acted upon regardless of who it seems to be from.

 b. You get email from a stranger (as if they know you or perhaps accidentally reached you through a typo) or a ‘company’ similar to the (a, above) in nature. Often, it will be a message indicating some action or obligation has been taken on your behalf which you do not want, such as confirming an order for Pizza, an airline reservation, subscription, etc. Or, it may simply be annoying SPAM. This is likely a snooping expedition and may be a phishing attempt, as well; What to do:

i.    Do not respond, not even to unsubscribe to SPAM (unless you repeatedly get the same offer from the same address). Such risks confirming your Netizen existence and defines you a working target, or worse, directs/redirects you to a phishing experience.

 ii.   If concerned the obligation really did take place, go directly to the Web site of the entity involved and research it there. Often, you will find they have options for reporting fraud, phishing, etc. Document (screenshots, copy/paste/witnesses) what you find/do, so you can get out of any wrongful obligation the turns out later to be existent, after all.

iii.  Create a filter in your email Client or Web mail options to block similar messages based on key word content and sender information.

iv.   Keep the message for a period of 90 days in case of unexpected consequence to be used with your documentation from step (ii), above.

v.    Same as step (v, item a), above.

c. You get a message from a stranger who wants to help make you rich, is sexually or romantically reaching out, or has some kind of deal too good to be true;

i.   Same as steps (i, iii and v), above.

ii.  If the message names a legitimate business or agency, consider step (ii), above. The Secret Service has a Web site for such complaints as well. However, IMO, they simply gather statistics and seldom do much more with the information. I have more information about how to detect and defend against this type of fraud at my Web site than do they — and in glorious color to make it easier to absorb.

iii.  Same as step (v, item a), above — but you need not do so every time, you simply want the general warning out there as an educational exercise.

d.  You get the famous Nigerian Scam (aka 4-1-9 Scam). Someone rich died or some other event has caused millions of dollars to be in limbo and someone who just happens to have access to it also just happens to come by your email address and wants someone to help share that money with him through some simple sounding and fail-safe scheme. They always ask for information about you. There are many other clues and signs, as well as the link (above) to my Web site.

i.     Same as all steps in (c) above.

e.  Variations of the above (a through d) delivered not by email, but via a social network or Group posting;

i.  Same as if from email source, except that the social network or Group may have special reporting options as well; such as a moderator to whom it should be reported.

Figure from actual Google Patent Application; Providing digital content based on expected user behavior.Got it?                                      I knew you would understand. My job here is done.

2)   Commercial Financial Gain, at your expense in a quid-quo-pro sort of way. Everyone IS a victim in that same way, or worse, but it is completely legal. There is zero information about you which is not valuable to someone for this purpose, and it is therefore a commodity almost every major player seeks, uses, trades or sells to make money based on the definition of ‘You’ and your preferences, likes, dislikes, and habits; Signs, Methods, and Solutions:

a.  You get SPAM email or Web pop ups or ad banners which reflect your general interests, either at the moment (e.g., you are searching for something the ad relates with), or overall interests;

i.   Web search engines use predictive marketing analysis (aka predictive analytics) about your search terms and what they know about you already through prior uses or shared information to ‘guess’ which of their advertising clients will most likely earn your business with an ad;  consider using a Web Anonymizer  (see separate dialog at article end) which veils your identity altogether . However, this will mean that your favorite Web sites will not know it is you and will not support auto-log in for account information, custom settings, etc. That does not mean you cannot manually log in and continue normally from there, unless an extremely secure site such as a Bank.

ii.   Many Web sites use analysis of what pages you visit and how long you stay on a page, and what buttons you click or roll the mouse over… also in predictive marketing analysis; not much you can do about that short of not going to the Web site — but it’s a matter of quid pro quo. You get something about them from their Web site, and they get something about you for your having done so.

iii.   Each Web site you visit may exchange ‘cookies’ with you, which are data bits which allow that Web site to recognize and acknowledge you as a prior visitor to when you next return, which in turn can further reveal what you like for predictive marketing purposes; consider turning off your Cookies option in your Browser Preferences. However, doing so will mean your favorite Web sites will no longer recognize you when you return, and auto log in, custom features, etc., again won’t work properly. So you have to remember to turn them back on if you want quid pro quo benefits.

iv.   Some Web pages may contain ‘pixel bugs’ (aka Web bugs, picture tags, pixel tags) which sense your presence on the page and reports that information (to someone). Pixel bugs are sometimes covertly placed without the page owner’s being aware, but more often, they arranged for it as partners with some third party. This works like cookies for marketing purposes, but can be more powerful. They are built into the graphics which make the page visually or informationally attractive. Often, a graphic thought to be popular is ‘bugged,’ and placed on the Web for others to copy and use, greatly amplifying its value; learn more, including some technical defensive options, here.

v.   VERY DANGEROUS in some cases: Many software downloads and some purchased software contains back door reporting routines to monitor what you do on your computer (may be limited to a given type of activity, such as Browsing, or specific matters related to use of the software, or may be more invasive, including obligating you to things against your best interests, sometimes with a financial impact). This has in the past been especially true of certain free games, on-line TV watching utilities, select computer utilities, and even major purchased software packages and operating sytems (yes, even big firms like Microsoft); READ the fine print in the user agreement and know what you are letting yourself in for (the nature of what they consider quid quo pro). Note: some illegal use of this method has been encountered, where the compromise of privacy/security was NOT mentioned in the user agreement, essentially converting the package into a virus in function. Know the reputation of the source, search the Web for complaints (but remember, no one makes a product that does not generate complaints from someone about something, and that often, problems arise which are user/user system specific because of unique configurations of their system or usage — so READ the complaints for relevancy to your use and privacy concerns).

map

From Excellent Network World article (click): ACLU Report: Spying on Free Speech nearly at Cold War Level

3)   Political Gain, often in opposition to your best wishes. Identical in nature to Commercial Financial Gain, but used for political purposes to sway opinions, most often with disinformation calculated to target what defines ‘You.’ Your opinions are shaped for you in subtle ways. It is a form of Political Control Technology. This often leads to item number 4, below, where you fail to bend and your bending is deemed extremely important; Signs, Methods, and Solutions:

a.  Also the same as Commercial Financial Gain, except that you can more easily be aware of and control your interaction with political topics most of the time. The tricky stuff is the disinfo built into what should otherwise be nonpolitical in nature. Everybody has a belief structure, and it easily finds its way into whatever they write with or without their conscious intent, but there are people paid to write things ‘off topic’ in ways which infect on purpose, and with great scientifically calculated psychological impact;

i.  In addition to thoughtful reflection (be wary, think logically and critically), it may help you to read up on the 25 Rules of Disinformation at my Web site (my most popular document with tens of millions of downloads).

b.  In Groups and Social Networks, you can count on ‘packs’ of members or friends participating in calculated diatribes, often staged arguments egging you to join in to get your views and or to alter your opinion. Often, the group is actually one person, a trained specialist (cyber troll) who has multiple fraudulent identities for the purpose, any one of which can troll for people to suck into more focused dialogs sans any need for staging an argument, but they usually join in at some point to ‘confirm’ the ‘validity’ of the preferred message;

i.  Same as (a, above), but actually, its easier to detect, even laughable.

4)   Political Paranoia, outright spying on you out of fear of what you believe or might do in their wildest nightmares of potentials. If you are an activist or outspoken in ways not in synch with the mainstream (politically incorrect) on ANY TOPIC, have participated more than once in a given topical protest movement, visited an activist’s Web site or site of the politically incorrect, YOU ARE A POTENTIAL TARGET. Governments (all of them) so covet their power that (most of them) feel any dissent or opposition must be presumed a threat and dealt with before it can actualize. This all too often leads to item 5, below; Signs, Methods, and Solutions:

a.  You find a sudden burst of requests for new social network friends or members to your group, and the dialogs/posts resulting soon thereafter tend to be inflammatory or inquisitive on political beliefs. Or, you find them somehow magically added without requests, or the requests read ‘secret request’ or some other no-such-thing-exists. You may also find others simply seem to dovetail perfectly with your beliefs with continual favorable commentaries to your own, someone trying to get close enough to you to pump you for information, later. These efforts can be as insidious as agent provocateur in nature, and/or attempting to build a comprehensive psychological profile of you for further targeting (item 5, next); What to do about it:

i.  Same as (a of item 3) above (be wary, reflective, and think critically);

ii. Do not REACT instinctively to inflammatory matters. Stop, Think (what is really going on, what to they really want), ACT (according to your best interests) — ACT, don’t React. This is a good habit to employ in ALL DAILY MATTERS as it will keep you out of needless arguments which harm relationships and impede daily progress. I wish I would follow this advice!

b.  You have a sudden explosion of SPAM and Phishing email, and the like. This may be an attempt by an Agency or Military cyberwarrior to infect your system with a spying virus for their own unique purposes. It can happen for other causes, too, of course, and is not a conclusive symptom in and of itself. But it is often coupled with curious events in your life and environment which imply some form of snooping in the real World; surveillance, following, surreptitious entries, odd telephone behaviors, etc.  This would be an escalation step less frequently employed — a preparation for (item 5, next), and most certainly part of it;

i.  Please consider my book or ebook (ProparanoidPress.com), The Professional Paranoid: How to Fight Back If Stalked, Surveilled, Investigated Or Targeted by Any Agency, Organization, Or Individual.

ii.  Review some of my other blog posts based on the book:

      1. In the Rearview Mirror: When You Think You’re Followed;
      2. Your Cell Phone is a Government Agent Spying on You.
      3. You find more sexually related outreach or SPAM than normal, or PORN related popups at the oddest times and places. Someone is trying to develop a psychological profile on you. See item 5 for a very caustic example of how dangerous that can become;

iii. Consider a one-time adventurous response to determine if it is targeting of this type, or generic SPAM/marketing outreach unrelated to spying as such. You WILL encounter unpleasant material by prurient standards. If it is spying related, there will be subtle signs. Again, see (item 5).

iv.  Do NOT respond at all (and for any such event where you elected option (i), above), delete or block sources where possible, as well as the specific message. Complaints may be in order if there is a means of contact, such as the Social Network or Group moderator.

NOTE: Any of (items 4, above, or 5, below) may additionally mean the FBI, CIA, DOD, or NSA (and variously other agencies of government, both foreign and domestic, as well as corporations, and criminal groups they partner or compete with) are specifically targeting your entire Internet activity (and beyond) by any number of means:
      1. All have admitted to or have been reported as employing signal capturing and analysis methods. A van can park near your home and capture router signals, or even just the RF (radio frequency) signals generated by your computer, in which case whatever is on your computer screen is on theirs. If you have a Cable or Satellite, or Microwave ISP source, those signals can likewise be intercepted and analyzed, either at your home, or at the ISP’s location. There will be varying success levels with the analysis attempt, and not everything will get through. Your phones and fax systems are subject to like attack capabilities, as hinted at in the above linked blog post.
      2. Most of these government bodies are not above employing virus attacks by conventional means. Just because you get a virus or were phished, does not mean it came from a criminal. It might be Men in Black, with or without legal authority, with or without official cause.
      3. FBI (and others with like tools) can obtain a warrant to install Carnivore or similar software at your ISP to gain complete access to your email, directly (and as many fear, everyone elses’ email going through the ISP). These warrants are incredibly easy to obtain. The new unconstitutional blanket warrants are even easier to get, and cover (everybody, more or less).
      4. Often warrants are not even necessary, especially with the larger ISP firms of the telecommunications industry flavor (think cellular), who give away information just for the asking if it comes from ‘the good guys.’ Many of these firms consider themselves extensions of the Federal Government for all practical purposes, and many (including Facebook, Google, et. Al) are invested in heavily by the intelligence community (CIA, most notably) who, in exchange, is granted unusual access to information and system control (ergo, they become weaponized when desired).
      5. The Internet was created by the military and ‘given’ to the public for use. However, the handful of key firms which constitute the bulk of infrastructure tools needed for the Internet to even function are essentially military-intelligence community contractors, which provides yet one more tool in the government’s spy arsenal.
      6. Internet 3.0 (a nickname for the effort to ‘improve’ the Internet by Congress) in the name of cyber security is eventually going to get past Constitutional roadblocks in Congress and will become a major censorship and spy tool for all government levels and agencies. If you have no clue, learn about SOPA and CISPA. See the closing section of this post for a breath of fresh air and relief.
      7. The Internet Kill Switch (another nick name — each government on the Planet wants one, including the United Nations) is likewise such a tool, one likely to be thrown whenever government does not like what we are doing (e.g., Occupy, especially after seeing what the Internet did to help overthrow Middle East tyrants), or want us to know what bad things government is doing (e.g., Martial Law, military takeover, extreme blunders that kill or destroy massively, etc.). The closing section addresses this, as well.

5)   Political Control Targeting, where you are deemed a viable threat to an agenda or cyber-powerful governmental (hey – I got hate mail from the Clinton White House and enjoyed much Web sabotage and other fun things while he was in office… and while Bush before him… and Bush after him… and Obama, now).

This means they fear you and feel they must deal with you more proactively, typically because their spying has revealed that other people listen to what you have to say and believe you, or your opinions are thought simply too dangerous to be heard (like many of mine, nasty truthsayer ‘terrorist’ that I try to be). Truth is oft seen as a thing too dangerous to be allowed free expression which might enable and empower a fully informed public, and must not be allowed to contaminate the lies of an errant government and/or a controlled media;

a.  Your social network starts having a lot of unfounded complaints against you resulting in curtailed services or functions, having to repeatedly provide your password, etc.;

i.  There is usually no recourse whatsoever, though I tend to ask my friends if any others are having the same problem, and complain so they understand the Social Network in question is infiltrated by government spying and engages in political control targeting (Facebook, that means YOU).

ii.  See this blog post for more detail on Social media infiltration and solutions.

b.  You start getting denial of service BOMBS — posting bombs to your social network or group, and/or email bombs to your email, which make it next to impossible to actually make good use of them for their intended purpose. I can get over 100 posts a minute, so by the time I see one from a legitimate friend to which I’d like to respond, and finish my current activity that I might do so, it’s scrolled off pages and pages away from access and very hard to find, and puts me thousands of posts behind in any attempt too keep  up. In email, it will be SPAM bombs (and watch out for that especially when it comes time to renew your Web domain name or other key matter — this is a tool to get you to fail to see the advice notices that you must act soon before the expiration date, and is how Web sites are hijacked by Men in Black;

i.  Same as (a), above.

b.  Porn redirects, where you find yourself unexpectedly at a Porn site, or by intention, end up experiencing the phenomenon referenced in item (4) above, which IS a psychological profile being run on you. A variation may be porn content or links magically appearing in your own Web content, or other signs of criminal hacking. Its not that uncommon, actually — just ask yourself, who benefits to figure it out;

i.  Consider running test to see if it is a psychological profile attempt (WARNING, if so, it should prove to be a disgusting experience). I suggest documenting the effort as described in (b of item 1), above, for your own protection. I’d tell you to use an anonymizer, except that if detected to be in use (easy to do), the test will fail:

      1. A step you may need to repeat six times or so before the answer is revealed: arbitrarily choose a link at the porn site to access specific content offered (a pic or vid). OK if that’s where it takes you, return and try again. But…
      2. If it instead takes you to yet another Porn Site, it may be a profile attempt. Now undertake step one at this NEW site. Again, repeat up to six times.
      3. If by the sixth new site you still remain conscious from the visual assault on your moral sensibility, and you have thus far encountered nothing but ‘normal porn,’ with nothing seemingly illegal, you are NOT being profiled, but simply a (would-be) victim of PORN scammers who make money off of redirects. The kind of site a porn addict would abhor but puts up with when encountered and abandons after experiencing multiple redirects.
      4. To make clear, if you INSTEAD start to see bestiality, torture/rape, pedophilia type images, congratulations: you have reached a CIA operated Web site (by some accounts, they have thousands of such sites). Don’t worry, it won’t land you in jail. That’s not their agenda. But if you continue to click on images, your sexual profile starts to be built. Once it is in hand, it may be used at some point to manipulate you or to target you with blackmail, etc, or sexual outreach intended to compromise you. So naturally, you shouldn’t click on those images. Hey, shame on you for even being there in the first place, right? Um… what was that URL, by the way?
      5. IMPORTANT. You cannot trust these and many other porn sites. Just visiting one can result in attacks on your computer’s security and your privacy, such as makes running Norton’s or similar IMMEDIATELY after the test a wise step. Again, Macintosh users should DEFINITELY take this advice regardless of the reliably resistant nature of their system. DARPA, the Defense Advanced Research Project Agency, undertook a special program evaluating the security of the Macintosh Operating System looking for ways to exploit it. I’m thinking they didn’t find any, given that no one else really has in the last three decades, but what does that tell you about governments potential intentions to spy and capabilities?

c.  You discover that at times, you can’t locate Web content that used to be there, can’t reach people by normal means, or you hear people can’t find your content, or reach you. It could be a Web glitch, or it could be that your Web activities or content is being selectively blocked, a form of sabotage known as black listing. This, too, can spill over into the real World — welcome to the daily life of being a TI.

i.  Its usually done at the Server level, so it can be at your ISP or the host ISP to your intended destination or recipient, or an intervening ISP between the them (most Web activity will relay the data through a daisy chain of a number of ISP servers making up the ‘Internet’). Start by contacting your ISP, and asking the destination/recipient to check with theirs, if you can find a way to make contact. Any decent whois service (enter whois in your search engine) can help with finding a way to reach someone.

ii.  You can employ a tracking utility to see where the series of relays between ISPs comes to a screeching halt, and contact them. I like VisualRoute because it is highly functional without requiring geek knowledge, but supports geek use, too. It can also help spot eavesdropping in the data stream and address other Web technical problems. Learn more here. There are a lot of other good ones out there, and computers have some built-in capabilites, per this video lesson.

d.  You should, with confirmations of any of the above, consider yourself under a full surveillance net, even though it may not yet be true — you need assume it true or soon to be true. Your home has been or will very likely be entered into covertly, bugs and or cameras placed, and you may eventually become targeted with electronic weapons (that is another topic altogether);

i.  Contact me immediately for a free Helps Kit and some free online consultation (its what I do). Do not outreach to authorities of any kind, as it is intended you do so that you might officially earn the label of paranoid, or worse. It is a means of discrediting you and part of an organized effort at making you a political, social, and ultimately, financial zero.

ii.  Increase your levels of awareness and review and improve security at home, work, and your vehicle. Talk to your family.

iii. Get my book, The Professional Paranoid. Natch!

iv.  Install a Primus pick proof lock, a lock designed for government needs and so good that government does not want you to even know it exists, and thus, the manufacturer (Schlage) does not talk about it, and their dealers (well established Locksmiths, only) try to sell you an alternative when you ask for it, even though they make more money on the Primus. Also, not all dealers are authorized to sell it. I have a long dialog on this topic with clients.

v.   Keep up whatever you are doing, because it surely must be Good in the Face of Evil, or you would not be targeted in the first place. Unless you continue to fight it, Evil will only get bigger and stronger — and worse for you, others like you, and our future generations. Do not fear them and their cowardly tactics. Remember it is THEY who FEAR YOU and your BELIEFS, and what you have to say or do about it so much that they are willing to risk revealing themselves as the true sociopathic fascists they are.

Top five solutions for Internet spying

Other Privacy Solutions Available

I mentioned Anonymizers (not to be confused with or thought affiliated with the group, Anonymous). This is a tool which can be free or for fee, can be undertaken by simply visiting an Anonymizer Web site and ‘activating’ anonymization per instructions found there, or by use of software they provide to turn it on or off at will on the fly. What it does is it strips away all elements of your basic user identification information, such as cookies and much more, and replaces it with their own, generic version. Thus when you subsequently visit ANY other Web site, it cannot possibly know anything personal about you other than you may volunteer once you arrive. You can play with one to see what it is like with and without use at anonymouse.org.

They don’t always have desired results, because a given site may refuse access for cause, or fail to function fully, or slow down a notable degree. Not a huge problem. The real problem is not that, but trustworthiness. There are a lot of anonymizers out there to choose from, some with very slick Web sites and marketing programs, which in my book, does not mean anything regarding trust, and if anything, is a mark against more than for trusting them. Perhaps I’m just living up to my name, and being ‘paranoid.’

But within a year or so of their first appearing on the Web by nobodies anyone ever heard of, and their popular use, they started going by the wayside and being replaced by newcomers, or merged or were taken over by other firms, and ‘improved’. To my way of thinking, governmentals and other smart people with agenda of their own, have sought to replace them or compete with bogus anonymizers which allow only THEM to see what you are doing.

Think about it… and how easy it would be to arrange, and in realization that if you don’t want others to know what that is, then that information may reflect something extra valuable, or which dovetails with someone’s agenda or political concerns. So they bait you, seeing you as perceived bad guys or as potential targets for (some agenda-driven purpose) to use their service that they may spy on you effortlessly. I’m especially wary of those based on downloaded software, which could afford additional backdoor access to sensitive information. I know there are good ones that can be trusted, but I have no way of knowing one from the other, for sure. Ack!

There is only ONE clear-cut exception I’m aware of, though any of the original firms going back to the 90’s in dating are likely OK, today, unless taken over or merged by some other firm, in which case I get nervous, again. The exception is called TOR (The Onion Router), which is Open Source. Open Source means public code that anyone can read (with some technical skill), and that being the case, it can’t be tampered with or contain threats to security without being detected and reported (that’s one advantage, the other being that it is FREE).

Yet TOR has its own inherent problem which should ALSO be addressed if used to send secure information such as an email message: you should additionally provide some form of adequate encryption of that content. This is a bit of a non issue with respect to simply visiting and using Web sites, however, though using a regular anonymizer AND Tor should likely make such visits even more secure. Learn more about anonymizers,  here, and more about TOR and the encryption issue, here.  Then there is also the greater issue of anonymous email, which you can learn about, here.

With regards to Encryption, that topic also deserves some comment. Your email service provider, likely your email client (e.g., Outlook) and Web mail (e.g., gmail), almost always provides for some level of encryption for security, much of it essentially functionless to sophisticated spying groups like government. I suggest that if you truly fear compromise of very sensitive data transmission over the Web, that you employ some heavier guns. There are numerous commercial products out there, but like anonymizers, I worry about built-in back doors with some of them. Once more, Open Source to the rescue: PGP (Pretty Good Privacy) continues to be a very popular and thus far quite reliable and easy-to-use solution. Learn more here.

Top five internet spying symptoms

New Solutions from Proparanoid

My approach to addressing security and privacy (de javu), to educate on the problem, provide a means to detect the threat, and find a means to resolve it. And also, again, I’m not particularly a Web technologist. So what follows are the results of a lot of thinking not just by myself with my approach in mind, but also with the help of people who know more than I do about Web security. We hope to advance the state-of-the-art in privacy and security.

NeVir Spies is nothing terribly new in the World, except with respect to how it is implemented and made available. It is in the category of a Virtual Private Email Network (VPEN), such as normally employed by large companies for internal email communications in an Intranet (a closed Web like construct for private corporate network connected computers). A VPEN is combined (for Web hopping between distant sites) with HTTPS, the secure form of Web servers (as opposed to HTTP, which are far less secure), to provide a truly secure email service with superlative features.

NeVir Spies is a variant on this theme with some added compenents which allow levels or layers of security and flexibility as the client may deem important. Like all commercially available VPENs, it is more costly than the free email accounts available with Web mail and through your ISP, who includes email with their monthly billing charges. It typically costs about as much as a good ISP, so using it effectively doubles your monthly outlay, but it gives you something the ISP cannot: assured email confidentiality, and some extra features in most cases. There is a lot more to know. Learn about it, here.

Now, this may sound strange… but don’t rush out to sign up for NeVir Spies right away, unless you have an urgent need. That’s because its about to get a whole lot better, thanks to my newest notion, now becoming a project in works… Web Walker:

Web Walker is a completely new and ultra low cost, fully wireless alternative to the Internet, itself, one which is ultra secure and private because it completely bypasses the ISP and telecommunications companies, and thereby, government. YOU become the ISP as well as the communications medium, in a very real way — and of course, you have no need of government involvement in that which you can legally undertake on your own. Even so, it remains compatible with, and is not intended (yet) as a complete replacement of the current Internet. Yet it affords a reliable replacement should the WWW be shut down or be compromised due to sabotage or natural disaster.

As an Open Source Project (OSP), it means free access — no ISP bill, though some nominal expenses can be involved in some cases for select users, and it can represent an income source for others, or the same select users. It does have some up front investment costs for some, but not all, because they might need to upgrade their equipment’s capability or perhaps have more of it if wishing to have more direct involvement.

That cost can be spread out among other users so as to seem negligible, which is where the nominal expenses and income are derived. As intended to be implemented, it will include NeVir Spies as an option, and do so in a considerably more economical fashion, and with a portion of the income going to offset select operational expenses to help keep Web Walker free to most users. In fact, some users will qualify for free NeVir Spies, and that’s why I’m not urging you to jump into NeVir Spies directly. However, it will be many months before Web Walker is available for general use by the public, so if your security need can’t wait… contact me now, anyway — especially since there will be ways to access Web Walker ahead of public availability in its testing and debugging phase. Guinea Pigs needed.

Web Walker, which will also need a new name, addresses EVERYTHING in this post one way or another, though it may not seem like it with superficial review. Its unique design will mean that even those users who might be deemed as system operators will not have access to the actual information transmitted (unlike an ISP or telecommunications system), and therefore, there will be no place for government to go with a warrant to access said information. It addresses all forms of spying and privacy concerns on the Web, especially political spying and targeting, and specifically addresses Internet 3.0 and the Kill Switch. Take a look at it.

If Hilary Clinton fears she and her governmental friends are loosing the (dis)information war (with citizens) because of the Internet, today, wait until they see what we can do when there is no way to use eavesdropping, tampering, or censorship to counteract it. Truth (the Pen) is mightier than Lies (the Sword). That’s Web Walker.

SPQR, PAX Amerikana: the Failing Roman Empire of the NWO


And why they must keep you afraid of (something) and distract you from the simple truth.

by H. Michael Sweeney
permission to reproduce granted if in full and with all links and credits in tact, and linking back to proparanoid.wordpress.com

SPQR, PAX Amerikana: the Failing Roman Empire of the NWO

SPQR. Design: Philippe Remacle.

SPQR. Design: Philippe Remacle. (Photo: Wikipedia)

At a root level, the United States governmental model is not that much different than that of the Roman Empire — especially today. Yes, I will be found to be generalizing in ways which take some liberties to make the point, but would hope the reader is intelligent enough to understand the reasoning for cause. Compare and consider:

• Both were/are based upon a Senate form of government (in Rome, they said ‘SPQR,’ which stands for Senätus Populusque Römänus — the Senate and People of Rome) headed by a supreme, all-powerful dictator with the ability to make his own laws regardless of basis in legality. We call them Executive Orders, they called them edicts from the Emperor who, in the declining years of the Empire, thought himself God. Hmm… you don’t suppose Obama…    ?

• Both were/are expansionist in nature based on superior military prowess applied in an endless series of wars to ‘insure peace.’ In Rome, they said ‘Pax Romana,’ which translates as ‘Roman Peace.’ For the Romans, conquest was early on territorial in nature and garnered slaves to build and maintain the Empire and establish a comfortable standard of living for citizens. For the U.S., early conquest was territorial in nature and garnered resources to do the same — over 140 military campaigns between 1776 and 1900, and more to come. Sure. Some were and would be righteous and just, but many were and would be contrived and questionable.

• In Rome, they declared neighboring peoples as ‘warlike’ and ‘barbarians’ to justify conflicts to subdue them. In America we declared the Indians and others in the same way, and even took land Canada had claimed by threat of war (54-40 or Fight!).

But it is the declining years where the similarities are more useful to the purpose of this missive, because America is clearly in decline, too. Let’s therefore go more slowly…

• Rome’s military was a fearsome beast which cost a lot to maintain, and which could easily overthrow the government if given a reason. For that cause, it was important to insure they were kept busy and constantly rewarded.  In America, the same is true. In point of fact, there was an early New World Order sponsored (the same powerful Fascist business elite as drive the NWO movement, today) attempt at a military Coup in 1934 which was thwarted largely by one man, Major General Smedley Buttler, USMC. More recently, four-star General Tommy Franks has stated that the next major terror event would result in a military form of government.

• Rome sponsored wars (‘Let loose the dogs of war!’) and allowed soldiers the reward of ‘Cry havoc!,’ a policy which let soldiers rape and pillage the conquered and keep a share in the spoils of war. In the U.S., the Military-Industrial-Intelligence-Media complex is rewarded by huge profits in the manufacture and sale of armaments and arms technology. The high ranking soldiers, themselves, reap their fortunes by taking seats on the Boards of Directors once they retire ‘with honors.’ Unlike the Roman military where one served until no longer able, most soldiers of today are short-term liabilities replaced every four years or so. Therefore, they reap no reward but that of medals for their valor, and perhaps a skill useful in seeking employment.

• In both cases, the taxes upon the people had/has become a great burden and the standard of living began to slip (brother, ain’t that the truth), and because money was harder to come by, less was spent in maintaining other important governmental responsibilities, the quality and operation of societal infrastructure began to decay, including the physical aspects made of stone, wood, and metal. That’s one reason why aspects of America’s transportation (bridges, mostly), water and sewer, and rail systems are in many cases on the verge of total collapse.

• In both cases, the people began to express dissatisfactions with high taxes and poor upkeep of civilization itself, and related woes, including the wars and the price of the military. Distraction was needed to keep the people happy. In Rome, they built coliseums and offered up gory gladiatorial massacres and theatrical entertainments. In America, they employed film and television technology to offer up unlimited access to pornography and artistic entertainments, and Grid Iron and other sports to replace bloodlust contests.

• And, in both cases, these distractions were not considered enough. The government saw that they needed to find a way to make the people see some outside threat as a greater threat than concerns over a failing governmental system. The only way power could be maintained was to instill a great fear, one so great as to justify a tighter Police State grip on the people. In Rome, it was the Huns of Germanic culture, and the Cicilian and Turkish Pirates of the Mediterranean. In truth, it was largely a non threat; the Huns couldn’t cross the the rivers and mountains which protected Rome, but the people weren’t told that.

Truth or Scare TV Show ‘poster’ (click)

In America, it has been a long list of like things… longer than you know (refer to this list of military actions which is from whence the counts are derived, herein):

a) In the 40’s and 50’s it was the Red Scare of McCarthyism and the Bomb which drove Nazi-style inquisitions and empowered Hoover and the FBI to become perhaps ten times as powerful as it had been before, and fostered the creation of CIA, the Department of Defense, the National Security Council, and the birth of mind control projects. We had WWII and Korea, and 24 other military actions. Television took root to keep us distracted with the likes of Lucile Ball, Bob Hope, Howdy Doody, the Mickey Mouse Club, and other mindless offerings (which I dearly miss).

b) In the 60’s and 70’s it was the Domino Theory and the Bomb (especially the Cuban Missile Crises), and ‘campus radicals’ which allowed the Military Industrial Complex to mushroom via Vietnam and 18 other military actions, plus a phony Drug War to allow CIA to profiteer, while at home the FBI and CIA ran COINTEL and COINTELPRO operations and gave us Watergate. We also learned about CIA’s infiltration and control of media via Operation Mockingbird, and how perversely they had sought after and employed mind control research. The Free Sex and drug culture kept many distracted, while the film industry began pumping out pornography to keep the less liberated distracted, and Television sold us consumerism for like cause on a scale no one would have thought possible. “Buy today, be happy (hold up box of soap next to smiling face)!”

c) In the 80’s and 90’s it was the ‘Evil Empire’ and off-shore and distant Dictators we had to fear, countered with an endless series of some 60 spats and more exotic entanglements like Iran Contra, Marcos, and Panama. The NSA made ECHELON a household word and we learned about FISA (actually a 1978 Act) secret courts that rubber stamped warrants to make political spying effectively legal — and trading of illegal political spy files by Police departments, CIA, and the Anti Defamation League/B’nai B’rith/Mossad (note: I was a victim of this!). It also brought us HAARP, the project born by a proposal ‘to control a billion minds’ by a Presidential Science advisor. Pornography escalated to video markets and strip bars are so commonplace that only live sex shows seem the unusual. But they’ve also learned they can distract us with news stories about celebrity sins such as skater knee whacking, football player knife slashing, and Royal weddings and the death of a Princess.

d) And that brings us to current history, where the idea of an endless war which can never be won was fostered; the terrorism ploy. Now this they are milking for all its worth. Police and Federal Agents are indoctrinated to the point of paranoia seeing ordinary acts as signs of terrorist behavior: you cannot take a photograph, pay for something with cash, write a school report or possess a bumper sticker which mentions Ron Paul, or cite the Constitution without being suspect of terrorism. You cannot go to the Airport (and soon, to a sporting event, theater, or public building) without being sexually molested by TSA. No remnant of the Constitution remains in tact, save perhaps the 2nd Amendment, which hangs on just enough to prevent total take over — the whole REASON it exists in the first place. And now pornography comes in over cable television, and live sex shows are becoming commonplace, and for the less prurient, reality television and the spread of lotteries and gaming casinos.

None of this makes real sense. Why should you fear a terrorist when excessive Police violence injures and kills more citizens in any given year than do terrorists in their best year (9-11 attack)? It is a bill of goods used to control you and keep you docile in order that the Military-Industrial-Intelligence-Media Complex can continue on its New World Order agenda, reaping in huge profits as they usurp more and more political control over you. They want us to fear terrorists. I say, let’s show them a form of terrorism they SHOULD fear; a free people who control their own government, as the Founding Fathers intended.

Unless you believe in and support PAX Amerikana, SPQR-style (are a Fascist), just say NO! Boycott the system at every level (be a financial terrorist): avoid banks, don’t use credit, buy used instead of new, repair instead of replace, refuse and resist GMO foods and grow your own, rely upon barter and cottage industry. Actually, there is an endless list of concerns similar to GMO. It would behoove you to learn about and resist conspiratorial NWO agenda projects like Codex AlimentariusAgenda 21Carbon Tax/Carbon Credits/Carbon Currency, United Nations Biospheres (and an endless array of other UN mandates), and the Canamex Highway and the North American Union via the Security and Prosperity Partnership.

Disobey government (be a political terrorist): insist on your Constitutional rights (for many of you, you must first LEARN what your rights actually are, especially with respect to dealings with Police and investigative agencies, and the court system) and go out of your way (be an activist) to do so; video Police (even if… especially if they pass a law against); employ civil disobedience and support Occupy and similar movements; write everybody in power and speak your mind; vote for no one who is not a Constitutionalist, a Libertarian, or an Independent (kill the Democratic and Republican Party Dog and Pony Show); write every media outlet to express your views and flood them with complaints over bias reporting, and write their advertisers threatening or actually seeking to boycott.

Please deem to review the 24 Planks post which attempts to highlight the changes needed in America to restore it to the strong and free country it once was. If you agree (or disagree) with any one of them, SO COMMENT on the page, tweet, share, reblog, and rate. THAT POWER is a right you should AT ALL TIMES exercise when you see something you like or dislike anywhere along these lines. How else will those who spy on us and those who (pretend to) serve us have good meter of our pulse and realize they had better back off a notch or two? If you do not express yourself, you have not learned the one simply truth: YOU are the one you’ve been waiting for to change what is wrong. Get busy, because they have an endless supply of Obamas and Romneys to take us further down that SPQR path to destruction.

Compare 1776 to 2012, and see where you really live, and decide if you are willing to accept that, or not.

Related articles

Proof Repeal of Posse Comitatus Will Establish Police State


A victim’s first-hand accounting of an actual illegal military assault on an American neighborhood with terror and abuse of rights

THIS IS INDEED A WARNING YOU SHOULD HEED!

Updated Feb. 21, 2013  Recent events cited below reveal the incident depicted here is currently being experienced wholesale fashion around the nation. There is little difference in neighborhood impact between the events described here and those which have been routinely put into action in major cities across America. And media tells us not. Local media, yes, but national media, almost always no. Ask yourself why that is, and then see if you think your news ‘fair and balanced,’ or if it more closely resembles the propaganda we always accused Russia of using in the Cold War era?
 
The only difference is that the current events are ‘military raids,’ not ‘police raids with military help,’ (some exceptions may exist) and the raids are not targeting individuals, but whole neighborhoods, and instead of having a warrant and a crime for which the warrant was approved, they have no warrant, and simply attack because they can. Fear and panic spread from the neighborhoods all the way to City and County officials, who in almost every instance were in no way warned or notified the attacks were to take place:
 
Helicopters swept in low between hi-rise office and apartment buildings, often discharging gattling guns, troops repelled to rooftops, streets, and parking lots, and went door-to-door through target buildings engaging in gun battles and tossing grenades as needed. Mock drills using blanks and flash-bang grenades, they claimed, but tell that to the citizens who, in some cases, grabbed their guns thinking they might need them any minute… to parents and teachers who feared for the lives of their kids as they put their schools into lockdown… to the city officials who’s 911 switchboards lit up and resulted in countless cars being dispatched, only to be repelled by armed soldiers.
 
The entire city thought war had broken out, or that Obama had decided to try to take the guns by force. And though neither was the case, that did not improve the safety of citizens at large. Any of those helicopters could have crashed, it being true that there are many such crashes in training exercises, as well as when on real missions. Anyone might have fired live rounds at the soldiers misunderstanding their purpose, including any illegal drug dealers unfortunate enough to be nearby. Anyone could have crashed their car in distraction, or had a heart attack in their panic. And for what? A practice at what? Raiding a U.S. city?
 

How dare the United States Military deem us a target, even in mock!

 
How is it they have the right to bear arms against us this way? The whole purpose of the second amendment is that we bear arms to protect ourselves against them, or a government gone mad and employing them against us. The military and White House has forgotten who they are, who we are, forgotten the Law of the Land, and thereby so dare. They have forgotten their oaths of Office each and every member has sworn, and  have moved forward the date and time when the second amendment will become our duty to defend by force of arms, thereby validating our Forefather’s concerns which drove its penning.  Shame on them for allowing it to happen.
 
This scenario played out in various forms in Chicago, Houston, Miami, Boston, Minneapolis, Los Angeles, and elsewhere. So as you read this review of a real raid where people were shot, consider carefully, for your city may be next. And, regardless of any foreknowledge that such raids exist and take place, you, too, will be forced to wonder: is this merely a drill, or is the government coming for the guns. Just another reason to fear your government, another reason to cower and let them get away with oppressive laws. Shame on you if you allow it to continue.
 
End update
 
There is no copyright or author to be concerned about citing as source associated with this article. I would appreciate any reproduction include all links in tact and point back to proparanoid.wordpress.com as it was I who obtained the material as part of my investigations and interviews with victims. The original author and his neighbors rightly feared for their safety (death threats had been delivered) and thus asked that I redact things which identify any who were not already named in news stories of the event. The material, which I have also included in my book set, Fatal Rebirth,  was prepared for use as a public notice and warning posted on doors of homes and public places in a Portland, Oregon, neighborhood in August, 1993:

military police state repeal of posse comitatus

Background and relevance to today’s militarization of Police methods:

This is almost exactly what businessman Johnny Senteno saw on a Portland Oregon neighborhood street seconds before being shot point-blank twice for the unpardonable offense of lighting a cigarette in front of his company truck. No one knows if it was Police or Oregon National Guard who shot him, as they dressed identically with no front-facing identification. Portland paid him $100,000 in a settlement.

(This introduction, and inserted notes are provided by me, author H. Michael Sweeney) In August of 1993 there had already been nearly two-dozen violations of the Posse Comitatus Act of 1878 taking place in various forms around America as the Bush Administration, through Secretary of Defense Dick Cheney, were testing to see what could be gotten away with with respect to Posse Comitatus. Most such events were singular violations of a given aspect of military use in Police actions, such as outlined briefly in another of my blog posts. This post will also reveal other forms of criminality used to fund black operations such as CIA drug running in America, and political graft.

In Portland, Oregon, the Chief of Police at the time was one Charles Moose, who had a background in Military Intelligence in the National Guard, and who was being groomed to be Police Chief in Washington, D.C., where crime was so rampant that the current Mayor was pushing for legalizing military use in Police actions in the city… and he would indeed get that post in time to be boosted to international attention as the Cop in charge of hunting down the D.C. Sniper, which this author feels was part and parcel of the DOD plan called Operation Northwoods, the blueprint for fomenting our false-flag war on terrorism. This is all documented in my book set, Fatal Rebirth.

Therefore, this ‘raid’ was a building-block tool for Chief Moose and quite tied in several ways to the ‘terrorist’ events to unfold on Sept. 11, 2001. More than this, it was a training exercise in general for the intended Police State future envisioned by the Bush/Clinton/Bush/Obama regime. I state it as a single regime because Bush programs aimed at achieving a Police State were continued and augmented under Clinton, and his under Bush, and his under Obama. It matters not who you vote for if in mainstream elections, they are all the same conspiratorial NWO players pretending to have varied political agenda worthy of providing distraction from their unified hidden agenda.

Posse Comitatus is not currently repealed. This is NOT a Police state under siege by revolutionaries… not quite yet. If and when that happens, government will have ONLY ITSELF to blame. Yet the government has taken steps to establish a de facto repeal to bypass the law (this Senate link details section 1031 of the National Defense Authorization Act signed by Mr. Obama, and there are other Acts and Executive orders which play to the matter). I fear it will eventually lead to armed rebellion if things get out of hand such as exemplified herein; if you allow our outlaw government to continue to ignore the Constitution and Bill of rights to undo Posse Comitatus, this is what you can look forward to on a regular basis… if not worse:

military police state repeal of posse comitatus

Public Notice and Warning (posted on neighborhood doors)

My name is [REDACTED], and I’ve been living here since 1967. A few months ago, the Police served a warrant on our house in what they said was a drug raid. Since we don’t use drugs we thought they had the wrong house — the people across the street were known Police informants and drug users, but they were not raided.

Even worse was how the warrant was served, and the aftermath. Part of it has to do with the fact that they used the National Guard in the raid — which I am told was done illegally, and in direct violation of a judge’s ruling. The cops dressed like soldiers but had permanently sewn Police patches, and the soldiers wore temporary strap-on license plates for Police markings — making it impossible to know who you were dealing with in the confusion — especially since they didn’t announce the raid or say they were cops. Everyone in the neighborhood at first thought war had broken out, since these Police markings were only visible on their backs.

Note: Chief Moose had already used the National Guard and military APC units in several Police matters in violation of Posse Comitatus. This had prompted a judge to issue a ruling in favor of The Posse comitatus Act of 1878 (which stipulates that the US military can-not be used in law enforcement duties except by declaration of Martial Law) — unless under direct order by the Governor under Martial Law.

Chief Moose continued in violation of the Court Order to cease and desist, citing ‘public safety concerns.’ But as you read this material, the reverse is shown to be true — the military put the public safety in greater danger. I wrote Governor Barbara Roberts about this and was given a copy of a ‘blanket authorization’ issued to Charles Moose (no Martial Law involved) to use National Guard… dated AFTER they had been used, and AFTER the judges order had been violated, but claimed to authorize the prior events, as well. Moose, by the way, several times on live TV agreed to meet with me for interview but in over a half dozen attempts to do so, I was informed he was ‘on vacation’ that day. So was the City Attorney, the Mayor, the Police Public Relations Officer, and anyone else I attempted to interview in his stead.

The first thing we knew, soldiers burst into our bedroom and pulled us naked from our bed. Instead of identifying themselves or why they were there, they only cursed and called us foul names, telling us to shut up. They forced us to cower nude for a good part of an hour, not letting us ask even for our clothes or covers. Eventually, they told us they had a warrant, but they also made lewd comments about my wife’s nudity as if trying to provoke me to fight. I worried it was to justify shooting me, and held firm.

They repeatedly ran a drug dog onto the waterbed, records and electronics, and delicate items on shelving, running him back and forth to maximize damage. They trashed the house so bad you couldn’t even walk through some rooms from the overturned furniture. Even though they had access to the whole house and keys to all doors, they continued to smash windows and locks. They threw birth certificates and personal papers into the wet sink and trash, and spilled solvents and paints on expensive automotive manuals for my work. They took live ammunition out of its box, took it outside the building, and threw it into deep grass. I hate to think what could have happened if I had mowed the lawn without noticing.

They found no drugs, but they opened and took mail. They took cash from a recently cashed pay check, and an uncashed check from a relative. They took all sorts of contractual documents about our finances, as well as property titles and all of our personal ID. They didn’t even offer us a receipt. When I later tried to get our things back, they said I had to obtain a notarized statement which, because they had our ID, was impossible. When I pointed this out, they just laughed at me and said, ‘Tough luck.’

But that’s still not the worst. In serving the warrant, the soldiers surrounded the entire neighborhood and went into yards everywhere, also arriving in an armored personnel carrier and with an Army helicopter overhead. They shot my dog in the eye and fired shots over the head of a woman opening her back door to see why a neighbor child had burst into her house screaming in fear. They also fired shots at a neighbor who was simply walking in the street, and forced him to the ground and cuffed him. Another neighbor, his wife, and an infant where held at gunpoint on their own porch while their property was illegally searched — they were not listed on the warrant.

A Hispanic businessman standing by his truck with both hands already raised to light his smoke was shot twice without a word of warning. When he asked for help, they shouted racial slurs, and told him to shut up as they cuffed him. Everything described so far took place before the Police drove up to announce “Police” and “warrant.” No one mentioned thus far, except for our home, was listed on the warrant or even near property on the warrant.

Few heard the announcement of “Police” or “warrant” because of the noise from the Army helicopter and Armored tank-like vehicle. Despite many witnesses, Police denied shootings took place. It was later discovered they had used a new kind of “non-lethal” gun outlawed in Europe by every major law enforcement agency as being too dangerous for general use.

Note: The businessman, Johnny Senteno, eventually won a $100K cash settlement against Portland Police for the shooting, which was proven in court to have taken place. In my investigation, the head of the SWAT Team involved first agreed to speak with me but terminated the interview when I raised the point about the weapon involved, which fired a dense compressed pepper-spray-based compound intended to ‘disintegrate’ on impact to engulf one with pepper spray at distance. However, fired at near point-blank range, they fractured bones and left bruises which took weeks to heal.

Many people, including several bystanders having nothing to do with the raid, and a pregnant woman, were cuffed and held at gunpoint for hours but never arrested or told why they were being held. Only after the TV crews had left, were these people released. They were instead warned to “keep quiet about this” if they didn’t want any “future problems.”

Cops told media our neighborhood was a drug haven where you could get anything you want, but several independent investigators say only a Police informant ignored by the raid was ever seen dealing. One private investigator made several connections between the raid and the murder of Anthony Duane Shaw by Police — thought to be blackmailing dirty cops, as was the other person named on the raid warrant. One connection led to my house, and two to the other house raided.

Note: Myself and at least four independent filmmakers and radio or cable TV show producers spent an estimated 400 hours between us investigating the matter, resulting in more than 12 hours of radio and TV presentations. This was on the heels of a like investigation of Shaw being shot 13 times by Police (his family won a $100K wrongful death award). My part was the least of the effort, but my methods allowed me to get closer to the identity of background players and their motives, uncovering profitable leads resulting in the more interesting discoveries.

Their experience was much like ours, but there, Cops took even stranger stuff — a guitar, a video tape of an episode of a real-life Cops TV show, and absolutely everything in the yard and a garage which they promptly declared as junk and a nuisance — even though the items in the garage were neatly boxed. This was true because the occupants had just moved in — those named on the warrant no longer lived there. This was done outside of due process, and investigators believe it was not taken to the dump, but rather to a convenient place for detailed search conducted out of the eyes of all authority.

But the Police did make an arrest — despite admitting to the press that no drugs were found. In fact, they left some rooms unsearched, almost as if they had found what they were really looking for. They later said one marijuana joint was found. This was then changed to drug distribution on court documents, but by the time they went to court, it had become drug manufacturing. The person charged was the fellow with connections to Shaw, and who, like Shaw, had himself claimed to be blackmailing dirty cops to leave them out of their drug dealing. He was railroaded. He was such a dangerous felon, by the way, that he turned himself in when he learned of the raid on the news, driving back to Portland from out of town to do it.

Note: All charges were eventually dropped since there really had been no discoveries made in the raid. The entire matter seems to have been orchestrated to obtain blackmail evidence against bad cops and sanctioned CIA drug smuggling operations, a matter in which I would later witness first hand a known CIA front’s involvement.

They later did much the same to my wife, eventually arresting and prosecuting her on minor charges equally false: after the raid they followed us everywhere we went, even into restaurants; they repeatedly made awful, insulting comments in public about us; they stopped us for phony traffic violations all the time, illegally searching our car without probable cause; they eventually planted and “found” a small quantity of drugs in the car.

Should you not believe that, consider how likely you would be to carry drugs in your car knowing the Police continually followed and stopped you, and searched your car. Unbelievably, at least one person on the jury turned out to be connected to participants in the raid by virtue of real estate deals mentioned below. The State-provided lawyer did not protest an obviously rigged jury once notified, nor did he provide good defense in court, hardly opening his mouth unless the Judge spoke to him.

Note: These matters were heating up on Public TV cable shows and though the woman was found ‘guilty,’ before sentencing could take place, the matter started to unravel;  Maj. General Gene Katke, head of the Oregon National Guard resigned his post amid an investigation described as regarding financial mismanagement. I was subsequently told the Judge declined to sentence her to jail time and instead elected community service/probation.

Another thing uncovered in private investigation is that the raid, continual Police harassment after the raid, and perhaps even the reason behind the murder — had to do with some sort of land grab by a mysterious series of dummy corporations operated by law enforcement and government officials involved in the raid. Someone representing [REDACTED] Mortgage offered us half of market value for our house “so we could walk away from all the trouble.” He told me that “powerful law enforcement and government people were in the company,” so I “should sell to them if I didn’t want any more trouble.”

I also know there are direct ties between this man, the Police, and between the company and the houses where the raid and harassment took place — where the families recently moved out after things got too scary. Men shattered the windows and beat one of the tenants with baseball bats, and threatened them with shotguns — the one who did the beating was a cop named [REDACTED] who, despite being from another county, was also involved in the raid.

Note: that cop eventually tracked me down because of my investigation of this aspect of the matter, and took action; he approached me with a gun in a folded newspaper while I napped during my lunch hour in my car at work one day. But my Guardian Angel woke me and I saw him in the rearview, and quickly exited to face him. Seeing the gun and the look on his face, I motioned with my head to inform him I had been (deliberately) parked under our companies security camera. He did an about face and I had no more trouble with him.

He wound up being the new landlord, suddenly owning a large number of houses in the area. He only accepts cash for his rent, refuses to give receipts, and will not sign a lease or rental agreement. He continually evicts people suddenly in the middle of the night by ‘Police orders’ and then keeps all their possessions they were unable to take with them. If anyone complains or takes legal actions, they get the same treatment we got.

The neighborhood continues to be harassed. Cops follow and stop most of us who have not yet sold our homes, drive by at all hours shining lights in windows, or they just sit and endlessly watch. They make us afraid to go outside. Some neighbors have been beaten by Police, had threats of arrest “to teach you a lesson,” and even threats of death. After beating one man in his front yard for mouthing back at the cops, they dragged his wife by her hair on the gravel roadway while she was wearing only a bathing suit — all in front of their kids. Despite the beating and the rough treatment, they made no arrests — underscoring that it was not “in the line of duty” or because they “resisted arrest,” though they were threatened with jail time.

Our house has been bugged, confirmed by the fact that arguments between me and my wife were being picked up on neighborhood short-wave radios, and covert entry was made to leave things, probably planted evidence for the next time. I’ve only told you a small part of the problem — I could go on for pages. Something is very wrong, and we worry that they will do something even worse. We have been tipped by friends close to Police sources to expect another raid, soon.

We are very afraid. Someone needs to expose what’s going on. Even though my wife and I have never had a history of problems with Police, they are now there every time we turn around. Our Police files were nonexistent before the raid, but now, they are inches thick with all the Police reports executed through the many harassment efforts. Not one entry has been legitimately made, but they make sure there are never witnesses, so we can’t prove it or file charges.

Rush Limbaugh mentioned the illegal use of the Guard on his show, but he didn’t know about the rest. You do, so be careful. If they want my house, they might want yours, too, since you are my neighbor. The cop has gotten at least seven houses in the neighborhood so far. You might be next…

End of original material

military police state repeal of posse comitatus

Summary Notes

I eventually managed to speak to the man representing the Mortgage company and learned that he himself was coerced and beaten (lost two front teeth) if refusing to help, and NOT an employee of the firm. He was, in fact, the ‘Police drug informant’ beaten with bats. When he did what he was told, he said, he was provided with drugs as reward.

He indicated that Governors of at least two states (he mentioned Arizona, California), city officials, and various law enforcement people had set up a company to purchase properties as silent partners (illegally concealing their identities). He told me houses were painted in a particular combinations of various two-tone colors to indicate who ‘owned’ and got the income from a given acquired property. Indeed, I found more than two dozen homes in the greater neighborhood with these identical paint combinations, in under thirty minutes time.

He also provided me with a copy of an ad used to secure renters for the homes. It had a phone number which went directly to Clackamas County Corrections, the very place where I had already identified a CIA asset working as a corrections officer, along with several bounty hunters trained at a CIA school in California. The phone number was an answering machine which simply asked you to leave your own phone number. I left mine, and it was shortly after that that I was visited by the Sheriff with the gun in a newspaper.

I later followed up with the Mortgage company and clues there led me to a CIA front involved in each transaction. That investigation led to discovery of a murder in the State Capital which seemed to be tied to acquisition of businesses in like manner as the homes. The more public the affair became on Public Access TV, the more things began to unravel, and the hotter it got.

There were more attempts on my life, including a ‘traffic stop for a burned out tail light’ by no fewer than nine local, county, state, and federal cars. Fortunately, my Wife was driving in her car with me, and stopped, thwarting what was presumed to be an intended replay of the referenced broad daylight murder of Shaw by a similar stop. Unarmed, he was shot to death by nine officers as he sat in his car with both hands on his steering wheel as commanded. He had allegedly tried to run down a Police officer between his car and one of the two cop cars which were literally bumper to bumper with his (their story), which conflicted with eye witness statements.

Before it was over, not only had the General resigned, but also, but the elected Clackamas County Sheriff Ris Bradshaw. The CIA fronts went under ground, and $12M worth of ‘confiscated homes’ were sold by the city to fund Police operations. I sent a letter of inquiry to Governor Evan Mecham of Arizona, and he also resigned that same month after being convicted on unrelated felony charges before that lead could be pursued. Naturally, there was no response to my inquiry.

I was just a citizen acting as a investigative writer for my book (Fatal Rebirth) on abuse of power issues. Don’t let anyone tell you a single individual cannot stand against the machine and make a difference by speaking out — and especially by joining with others of like mind. One General, one Sheriff, one Governor resigned, CIA fronts shut down, stolen houses converted from graft to public revenue, and more… thanks to our efforts to get at and tell the truth. Yes, it was risky, but why live a life in fear of living it to the fullest of potential? If they can cower you that way, you are not as free as they wish you to believe.

What of Early, of Late?


How vastly different life turns out for one friend compared the next… and yet how much so alike as to be frightening


Copyright (c) 1996 by H. Michael Sweeney — All Rights Reserved
Permission to reproduce for non profit use granted provided it is reproduced in full and links back to proparanoid.wordpress.com. This article was written for the Oregonian, but the Editor notified me that they no longer wanted my Op-Ed submissions because they generated too many responses critical of government. So I added the Oregonian stings and published it instead in my book set, Fatal Rebirth.

posse comitatus act posse comitatus group gun control

From the local news: A Portland man was arrested today for shooting two State Troopers in the back after being stopped for a traffic infraction. Neither officer was seriously wounded, thanks to bullet proof vests. Arrested at the scene on charges of attempted murder was Phil Early, of Portland, Oregon…

As it happens with many news stories, there is more to the story than meets the eye. Sometimes, there is a story behind the story.

I knew Phil Early in a more innocent time. I knew him as well as anyone, both teenagers attending Jefferson High School. He was a very different person then, certainly exhibiting no characteristic that might lead to his shooting a female State Trooper and young man wearing a State Trooper uniform* in the back. His worst offenses in those school days were being suspended for playing hooky.

Having lost track of Phil after I went into the military, and having often thought about him over the years and the many good experiences we had shared together, I must wonder what could have brought him to this unlikely end. Having heard that he had joined the Army and was killed in Vietnam, it is a shame that it took this tragic news event to reveal the error in that information and open the possibility of our meeting again. Perhaps, under the right circumstances, I might even have made a difference in his fate. This haunts me.

posse comitatus act posse comitatus group gun control

But that is not all that haunts

Despite the outwardly heinous act and the many negative stories of Phil in the local media, there still seems much good about Phil in tact from when I knew him. He still is a caring and giving person, according to those who knew and worked with him in his last days as a free man. It is said that he helped anyone who asked and gave of himself freely, without judgment. I even understand that he had fallen victim to con artists who took advantage of his giving nature, but he had not let their greed dim his caring for or trusting of other strangers in need.

This was the Phil I knew, who would volunteer to loan his best blazer to a casual acquaintance (I had known him all of fifteen minutes when he offered it to me), or a Phil who would give his last two bucks for gas to a stranger stuck in front of the local grocery store. And that memory does not tally with the news reports of a man who supposedly, by association with Posse comitatus, has a hatred for other races. The stranger he had helped to buy gas in the early 60’s was a black man. In those times, equality was a mere dream in Martin Luther’s sermons, but already reality in Phil’s heart.

And speaking of Posse comitatus, I try not to automatically think harshly at the sounding of the name. It was the Posse comitatus Act of 1864 which protects citizens from abusive application of military against civilians in police actions, unless under martial law. This, perhaps, is why the current group by that same name does not recognize the State Police as a duly authorized Police agency.

Rather, they feel that any armed force under direct authority of State rule, regardless of the name it uses, regardless of the document of law or charter which empowers it, and regardless of its stated mission or rules of procedure, is nothing more than a state militia — a military body. As such, just like the National Guard, it is seen as a military unit subject to the Posse comitatus Act.

It was originally reported that Phil, like many Posse members, had an arsenal of weapons and ammunition. The Posse apparently believes, like many groups, that it is up to the citizens to protect themselves from the possibility of a military overthrow of the government — a thinking which, in exercise, requires a well armed and well trained civilian population. I now understand that Phil’s arsenal has turned out to be closer to the number of guns owned by the average farming family in Kansas. The description of many of these weapons apparently better matches that of “collector items” than of “arsenal.” This is closer to the Phil I remember, who liked to collect a variety of many like things, as would please his eye. In blazer’s for instance, he had nearly a dozen. He had many fewer guns.

There is one disturbing thought, however. As different as our lives must have been, and as different as our current situations seem, there is much about Phil’s late history that matches my own life. I, too, have grown suspicious of many in law enforcement, and have had my share of confrontations with them, including multiple attempts on my life by assassination.

Phil’s negative experiences might be deemed politically shaped by Posse comitatus. Mine have been as a result of investigating illegal activities of those within law enforcement — coincidentally involving illegal application of National Guard and other Federal agencies by or within police — the very thing feared by Posse comitatus.

posse comitatus act posse comitatus group gun control

The nature of fate?

In realizing this commonality, I ask what might bring us so tenuously close in our thinking and experiences, despite the many years and miles between us? I go back to the innocent times, and a possible answer seems apparent. It was the time of Camelot. We, the youth of the nation, had a man in the White House we could love and look up to, regardless of any political realities perceived by our elders. And then, he was gone, taken away in violence under questionable circumstances.

I remember well the weighty discussions with my peers at the time, including Phil, of course. Even then, the theories were abundant. As more was learned, the doubts grew about the lone gunman theory. Perhaps this dashed our innocence and planted a seed of mistrust of an armed government and its secret minions of intelligencia – a mistrust which ultimately led us each along separate but similar paths, once we parted ways at the end of high school.

Now of course, there are more facts pointing to CIA assassination than to Oswald. Despite CIA Operative testimony under oath in court that CIA was directly involved in the murder and a cover up, which necessarily and demonstrably began before the murder, media still chooses to label anyone who questions such things as “conspiracy buffs” — despite the fact that major media was present in the court at the time to hear that critical testimony.

That the CIA-Operative witness had, within weeks of the assassination, come forward to FBI with the same material, and later, also testified to the Warren Commission — and all ignored the truth, does not make us “conspiracy buffs” feel any better about media or government. Apparently media prefers to continue to publish fiction as fact rather than admitting they were blinded to the truth from day one. Perhaps government simply finds cover up the only acceptable way of life.

Come to think of it, local media and government did the same with local murders undertaken by Portland Police. Despite abundant witnesses to the contrary, media blithely published verbatim as fact, Police accounts of the shooting of a young man named Shaw — an event which I have researched to conclusions contrary to their version of the story, as documented elsewhere. There was a similar conspiracy of silence with respect to the 104th and Liebe Street Raid.

There, National Guard, including a helicopter and an Armored Personnel Carrier (APC), was illegally used in an alleged drug raid, but this author has discovered was more likely connected to the murder of Shaw. Local TV station KATU was the only station covering the raid, a matter itself perhaps telling since their former anchorman was also a former Police Commissioner and current City Councilman. Civic-minded KATU edited in new questions to field interviews of the neighbors of Liebe Street, in effect reversing their answers to make them sound supportive of Police actions, instead of condemning… everyone on Liebe Street was outraged at Police, the Guard, and KATU, but media would not air their grievances, nor would any government agency.

Surely, this angered the Posse. It angered many people, especially because of the abuse of power exhibited by Police. That summer saw Portland host the Guns and Hoses Olympics, where police and firemen from around the nation came to visit. With competitions in sniper shooting and police dog attacks, there was also likely an effort to show off Portland as a modern and well-equipped Police Department. Perhaps, but some would point to statistics to show it one of the more deadly departments, with the best way to die of gunfire by Police was to call 911 and threaten to kill yourself. They usually finished the job that those less dedicated to the deed could not. Perhaps it was such things, both old and new, that drove Phil’s anger.

Perhaps there are many from my generation who cannot let go of our misgivings and outrage from such things as the murder and cover up of our President by our own government agents. Perhaps there are many who, at least secretly within, believe in their heart that that terrible act in Dallas was the first of many dark chapters — chapters sufficiently dark to suggest a fearsome future at the hands of their authors.

That we see and deal with seemingly endless supply of similar Federal abuses and lesser version on a more local scale, does not help. Some of our generation are moved to action, while others prefer the safety of quiet contemplation. For those of us moved to act, some choose the pen, as have I, and some of us choose the gun, as apparently did Phil. Phil himself deeply regrets his actions, which he says were driven by the dominating and abusive attitude of the officer. Something, he says, just snapped within him.

posse comitatus act posse comitatus group gun control

How do we judge such matters?

I cannot condone what Phil as apparently done. I can, perhaps, understand its root cause. Society must condemn his actions. In friendship, however, I am moved to point out that this is not a simple case of gun violence, as many in media have promoted with gusto. Indeed, there is no such thing. Gun violence is not a living thing which happens of its own volition. Gun violence is the result of a given set of life experiences and circumstances. In fact, those things would conspire to vent violent action even in the absence of a gun — such as stabbings or other assaults.

Those that believe the guns are the evil root should therefore also seek to take away all the knives, baseball bats, pillows with which to smother, stockings and ties with which to strangle, etc. Each case of gun violence deserves some degree of calm analysis towards possible prevention of future shootings — not a knee jerk call for seizure of arms. In analysis of Phil’s case, I suggest his actions were driven by something which those very actions themselves could not possibly well serve.

Could Phil have thought through the emotions that drove the instant, and looked beyond in some considered philosophical light, he might have come to the same conclusion. I would suggest to Phil that his enemy was not present when he opened fire. It was not present in the persons he shot, except perhaps by some misapplication of mere symbolism. They were most likely doing a tough job in a just cause. Nor was his enemy their leaders or those that worked to create agencies so troublesome to the Posse.

No, not these things, but far less tangible things. An unhappy history with no suitable answers of blame. A docile public apathy with unconscionable surrender of power to an increasingly errant and abusive government. A growing frustration with no means of proper release. A gradual loss of freedoms to a New World Order. A reasonable fear allowed unreasonable control.

Looking back, and talking to others, I wonder: how many of my generation have traveled so perilously close to Phil’s path? How many more of us are near the line he has crossed? Too many, I fear. A legacy, perhaps, of Dallas? A signpost, perhaps, of our future path?

~~~

posse comitatus act posse comitatus group gun control

* The second person shot was, of all things, an Explorer Scout.

Under some extremely inappropriate reasoning, the State of Oregon and the Boy Scouts of America have decided that it is appropriate to dress Explorer Scouts in full State Police uniforms, sans weapons, and put them on the streets and in patrol cars — on the front line against crime, unarmed, untrained, and often, unsupervised.

This deserves another article of its own, as yet another example of the growing Police State in Portland, Oregon. Here, in Portland, highway workers, Explorer Scouts, firemen, private security firms, the National Guard, and even gang members, have all been inducted into the general law enforcement umbrella in one way or the other. One has to ask, why?

I only wish that Phil had thought to ask such questions first, and not have shot, at all.

 

25 Questions No One Has Asked About Aurora Shooting (pt. 2)


You can always spot a conspiracy at work… was james holmes a patsy by DOD or CIA? whenever you see evidence of a cover up in play

Our review continues from PART I, by H. Michael Sweeney, Copyright © 2012 all rights reserved. No reproduction permissions will be granted for the first 90 days. Links only, please.

In review: This in-depth series of posts will reveal startling new investigative issues for the first time, anywhere. The detail required to make concise arguments on a long list of critical elements forces it to be offered in installments. You may wish to subscribe to be sure you do not miss one along the way. Doing so, you will discover:

  • Three motives for making James Holmes a Patsy with Fascism as benefactor, and two possible motives for targeting Century Theaters
  • Easy link access to the key-most videos and images for each critical point of evidence presented in a logical, easy to follow order.
  • Reasoning there were at least three additional helpers involved in a professional black operation backed up by even more supporting players
  • Introduction of an actual political REASON for targeting The Dark Knight Rises (TDKR), a reason which fits one of the proposed motives
  • 25 key questions missed by almost everyone, the answer to any one of which could easily provide reasonable doubt that it was a lone gunman event
  • A walk-through narrative portraying an alternate scenario which fits all  conflicting facts into a workable reality.

James Holmes was a patsy Part Two

James Holmes was a patsy

 second gas mask and gun in aurora prove holmes a patsy

If you missed part one, click here

QUESTION 8: Who warned people not to use the EXIT in theater 8, and why? Tim McGrath mentions it, and I’ve seen but lost track of one other witness who confirmed the same point. Tim says the people in 8 were panicking and trying to leave. Toward the end of the clip he states someone entered the theater from the Lobby area and warned everyone not to go outside because the shooter was outside. Excuse me? How would they know this? If there was, WHO was it, because according to this witness, shooting was still going on in theater 9? Could this be misinterpretation or misunderstanding? I’d be open to the suggest except that it also happened in theater 10…

QUESTION 9: Who warned people not to use the EXIT in theater 10, and why? At 2:50 AM Channel 9 coverage has a witness from (by deduction) theater 10 who describes events while the shooting was going on in theater 9.  We really need to pin down if it was theater 10, so here is the deductive logic thread: Someone came into the theater from the left entrance, and warned them not to go outside, again while shooting was still taking place. Theater 9 would be to the left of theater 10, and theater 7 would be the left of theater 8. It would not be logical to presume someone further away from events (nearer to theater 7) to either be criminally involved or otherwise inclined or able to perceive a need for a warning. Any such person would need be closer, so it had to be theater 10. So again, who and why… would someone issue a warning without basis for such knowledge?

QUESTION 10: Why were bullets going through the walls into both theater 8 and 10? A look at the theater diagram from the Denver Post reveals that it would be logical for some rounds to pass through into 8, but there are only two ways it could have happened in theater 10. Either there was a second shooter unseen because people were attempting to hide or flee with their backs to the screen, or James deliberately turned his weapon on the wall. It is also possible any second shooter went behind the screen to appear in the dark on the far side, making them hard to see, but only if they used a silencer to completely suppress flash. This would create a distinctive sound witnesses did not report, as far as we know. Only in a cross fire situation should bullets logically enter 10, as shooting the wall is illogical. Why would James waste rounds to shoot the wall, especially since his shooting spree was ended prematurely when his gun jammed? Has anyone counted the bullet holes and compared to the half-empty magazine?

QUESTION 11: Who wore the second gas mask and used the second rifle found behind the theater? We have multiple Police statements which confirm James was found in his car and had with him in his car, a gas mask, and three guns: an AR-15 rifle, a Remington 870 shotgun, and a Glock handgun, with a second handgun and the high-capacity drum canister for the AR-15 discarded inside the theater.

Yet we have photographic evidence, Police radio traffic (18 minutes in), and additional statements to the press which prove a second mask and weapon were found lying on the ground behind the theater. The gun was at the threshold of the EXIT door, and the gas mask was found all the way at the end of the building, some 150 feet away from the EXIT and Jame’s car, where ‘the shooter’ is first reported being seen. The gas mask is part of a whole other series of questions which are the most troubling, of all. So why did James bring but not use two rifles, and two gas masks? And why does that weapon show a standard magazine (the light gray forward appendage). We were led to believe he quit shooting because his drum magazine jammed (which he left inside). Curious, as I would have thought the gun would be sans clip of any kind.

2nd gun with standard clip, girls shoes at outer exit leading to theater 9 & 10
2nd gas mask at far corner of building well away from where James waited

QUESTION 12: Why did the shooter not shoot the first and most logical victim? Jennifer Seeger clearly describes on ABC, a rifle being the first gun used to shoot into the air, and then it was leveled at her, but the shooter paused and did not shoot. She dropped to the ground and he instead opened fire on the crowd behind her. The clues to the answer as to why may lay in the next few questions.

QUESTION 13: Why does one witness says the first gun used was a rifle, and another a shotgun? We know he had both a Remington 870 shotgun and an AR-15 rifle with him. Both witnesses state the gun used was aimed directly at them, and both were within a couple of yard’s distance of the shooter and near to each other, and both took cover quickly. There are several other questions regarding these accounts, but the bottom line is that there is both a visual difference in the appearance of such weapons, and a stark difference between them their sound when fired. It is inconceivable that one can misidentify a shotgun as a rifle some mere feet away, especially once fired. Does the 870 shown at right look like a rifle, to you? Does the rifle look like a shotgun?

Which is which? Is it that hard to tell? What about the sound difference?

We have already examined Jenifer Seegar’s account. Here is the shotgun account by witness, Pierce O’Farrell, in a Channel 9 report, In point of fact, he was immediately shot at and wounded by shotgun, twice — once before being able to gain cover, and the second while he lay low.  All witnesses seem quite believable taken on their own, but I find a shooting victim with medical treatment confirming their story more credible than someone unscathed. Why two distinctly different accounts? Again, other questions may hold the answers…

QUESTION 14: Why did several witnesses stick around for more than a day and well into the night and even the next day after the shooting to be interviewed endlessly by local and national media, to include multiple appearances on a given media outlet? I raise this question because they both tended to use the same individualized phrases and hand gestures over and over, and both emphasize a lone gunman. In some cases, the cameras seem rather far back to insure we see the gestures. In fact, one of them goes overboard in his efforts, consistently waxing emotional to the point of tears. More to the point, the conflicting facts cited above play into the matter, and may be why more than one ‘conspiracy theorist’ has suggested these are paid actors intending to Wag-the-Dog.

Here is the man, Chris Ramos, on CNN. This is him on ABC. The others are Jenifer Seegar and her friend from the ‘rifle’ account just spoken of. She is seen here on ABC, and here on CNN. Her companion who frequently appears with her but who hardly speaks, becomes a kind of ‘silent confirmation’ to cement the reality of her statements. If these habitual appearances are not a Wag-the-Dog plot element, I’d like to know what they really are? Seegar’s not being shot and not knowing which weapon first was used suggests she was not actually present — but if that’s true, then the only way she could have known about the first shot being in the air would be if she was a participant with prior knowledge of the plan. There are yet other clues of Wag-the-Dog forces in play, as seen next.

QUESTION 15: How did CNN’s Wolf Blitzer manage to so quickly have available a slick 3-D computer-rendered, fully touch-screen interactive replay of the crime, and why was it altered between airings? His show, some 12 hours after the shooting, but only a few hours after witness accounts and Police statements useful for the purpose were known, provided the most comprehensive report yet available, and put EVERYTHING from the OFFICIAL  STORY into clear context. Find it here, the third video down in the group of smaller videos toward page bottom. How did they mange to have this super sophisticated technology ready to go so quickly, unless prepared in advance?

I am additionally concerned because subsequent use of the same presentation in a later program is altered. The first presentation shows only James’ entry via the EXIT and the aftermath (e.g., the kicking in the door first impression). The second shows someone going to the EXIT from within the theater to the EXIT door, depicting them LEAVING, which NO WITNESS HAS DESCRIBED, followed shortly by the shooter’s entrance (as if not expecting someone would end up recounting the man opening the door, and thus it does NOT show him returning from the door, but vanishing). Witnesses specifically describe the man from inside as NOT leaving the theater by the EXIT and a significant delay before the shooter arrives.

You see the altered version here at one minute into the CNN video.  This change took place after challenges to the ‘kick the door’ claims were taking hold on the Web, perhaps best exemplified by Alex Jones’ special report to that end earlier in the day. Yet the witness reports about the man opening the door (and NOT leaving) were known to media before even the first airing. Why was it not included in the first place if not Wag-the-Dog? Why was it subsequently altered to an INCORRECT depiction, later? Yet one more possible clue follows…

Was Aurora shooting a DOD or CIA operation?

The next installment asks these important questions:

James Holmes • How did CBS News know to describe ‘buckets of ammunition’ before anyone had seen inside Jame’s apartment?
James Holmes • Why did the shoot try to get into theater 10 after leaving 9 when his gun was jammed?
James Holmes • Why was James so calm when arrested when the official reason is impossible?
James Holmes • Why did James allegedly mail his attack plan to arrive well before the attack?
James Holmes • Why did his Psychiatrist call Police when it was not delivered to insure they found it anyway? 
James Holmes • Why was almost everyone in James’ life connected directly or indirectly with Mind Control technology?
James Holmes • And more…
 
PLEASE: Comment (page bottom, or contact me), Rate (at page top), Share/Tweet this article. Visit my Reader Forum to promote your own cause or URL. 
Related articles

25 Questions No One Has Asked About Aurora Shooting